one, SPDY or HTTP2. What on earth is seen on the two endpoints is irrelevant, given that the aim of encryption just isn't to produce things invisible but for making things only visible to dependable functions. So the endpoints are implied from the issue and about two/three of one's answer is usually taken out. The proxy information need to be: if y