1, SPDY or HTTP2. Precisely what is obvious on the two endpoints is irrelevant, because the target of encryption just isn't to produce matters invisible but to make items only seen to reliable events. And so the endpoints are implied in the issue and about 2/3 of one's remedy is usually eradicated. The proxy information must be: if you use an HTTPS