1, SPDY or HTTP2. What is seen on the two endpoints is irrelevant, since the objective of encryption is just not to help make things invisible but to create factors only noticeable to trustworthy get-togethers. Therefore the endpoints are implied within the concern and about 2/three of your response might be taken off. The proxy data needs to be: i