Note however, that it is still feasible for attackers to use equipment that aren't instantly linked to the world wide web. One example is, by way of viewing a web page.one, SPDY or HTTP2. Precisely what is noticeable on the two endpoints is irrelevant, since the goal of encryption is not for making matters invisible but to produce things only seen