1, SPDY or HTTP2. Exactly what is seen on the two endpoints is irrelevant, as the target of encryption isn't to help make issues invisible but to create things only noticeable to reliable functions. Hence the endpoints are implied inside the dilemma and about 2/three of the remedy is often taken off. The proxy details needs to be: if you utilize an