1, SPDY or HTTP2. What on earth is visible on the two endpoints is irrelevant, as being the intention of encryption isn't to produce factors invisible but to make issues only noticeable to dependable get-togethers. So the endpoints are implied within the concern and about 2/3 of the respond to is usually taken off. The proxy information ought to be