one, SPDY or HTTP2. What exactly is obvious on The 2 endpoints is irrelevant, because the aim of encryption will not be to help make issues invisible but to create items only noticeable to trustworthy events. Therefore the endpoints are implied within the dilemma and about two/three of one's answer could be taken out. The proxy data really should b