This blog post investigates HTTP/2 implementation issues and some of the resulting security implications.