1, SPDY or HTTP2. Exactly what is noticeable on the two endpoints is irrelevant, as being the objective of encryption will not be to create things invisible but to make matters only obvious to reliable get-togethers. Therefore the endpoints are implied while in the issue and about 2/three of your respective answer is often eradicated. The proxy det