one, SPDY or HTTP2. What is noticeable on The 2 endpoints is irrelevant, as the goal of encryption is not to make things invisible but to help make issues only visible to dependable events. Therefore the endpoints are implied within the question and about two/3 of your answer is usually taken off. The proxy details ought to be: if you employ an HTT