1, SPDY or HTTP2. What on earth is visible on the two endpoints is irrelevant, since the objective of encryption is not to produce points invisible but to create things only noticeable to reliable functions. Hence the endpoints are implied during the query and about 2/3 of the answer could be taken off. The proxy information and facts needs to be: