one, SPDY or HTTP2. What exactly is visible on the two endpoints is irrelevant, because the goal of encryption is not really to help make things invisible but to generate things only visible to reliable parties. And so the endpoints are implied from the dilemma and about two/3 of your respond to can be eradicated. The proxy details needs to be: if … Read More