one, SPDY or HTTP2. Precisely what is obvious on The 2 endpoints is irrelevant, given that the goal of encryption is not really to produce points invisible but for making things only noticeable to dependable functions. So the endpoints are implied inside the problem and about 2/three of your respective solution may be removed. The proxy information