one, SPDY or HTTP2. What on earth is noticeable on The 2 endpoints is irrelevant, since the intention of encryption is not really to help make issues invisible but to help make factors only obvious to dependable parties. So the endpoints are implied during the concern and about two/3 of your solution might be eradicated. The proxy information and f