one, SPDY or HTTP2. Exactly what is obvious on the two endpoints is irrelevant, because the objective of encryption is just not to create points invisible but to create points only obvious to dependable events. Therefore the endpoints are implied inside the problem and about two/three of your respond to is usually eliminated. The proxy data really