one, SPDY or HTTP2. Exactly what is visible on the two endpoints is irrelevant, as being the goal of encryption just isn't to generate matters invisible but to make issues only visible to trusted parties. So the endpoints are implied within the query and about 2/3 of your solution may be eliminated. The proxy details needs to be: if you employ an H