1, SPDY or HTTP2. Exactly what is obvious on the two endpoints is irrelevant, as the aim of encryption will not be to make items invisible but to create factors only seen to trustworthy parties. So the endpoints are implied while in the dilemma and about 2/3 of your solution can be eradicated. The proxy details ought to be: if you employ an HTTPS p