one, SPDY or HTTP2. What on earth is visible on the two endpoints is irrelevant, as the purpose of encryption isn't to generate things invisible but to produce points only obvious to trusted parties. Therefore the endpoints are implied from the dilemma and about two/three of your respective respond to may be eliminated. The proxy data need to be: i