one, SPDY or HTTP2. What on earth is visible on the two endpoints is irrelevant, as being the intention of encryption isn't to produce points invisible but to help make things only visible to trusted parties. And so the endpoints are implied in the question and about two/three of your respective respond to is usually eradicated. The proxy informati