This is part of the hypertextual biography of Suso Baleato (© 1997-2016).

The most effective modality to interact with me through cyberspace is the classic and reliable electronic mail. Other modalities could be useful as well. The notes below provides important details on my standards of availability and privacy:

Realtime is disabled by default.
Many of the available electronic interaction modalities do deploy very intrusive, distracting and stressing functions. Those features tend to make it difficult to attain the necessary concentration levels required to efficiently perform non trivial intellectual tasks. For that reason, all synchronous communication services (like those phone calls, video conferences, chat conversations or real time notifications) are disabled on my personal cyberspace by default. This means that nobody might expect, without getting frustrated, any synchronous request to be attended, unless it was scheduled in advance -usually by mail.

Privacy shall be enabled by default.
Personal communications do belong to the privacy sphere shared by the peers who participate in the conversation. Interestingly enough, the current technical paradigm leans toward the relay and storage of messages as clear text, allowing illegitimate access to private communications. Added to that, the monetization of personal data is behind the gratuity of many interaction services which allows massive and automated access through their Application Programming Interfaces. That allows performing sampling of social networks for academic research, wich is my case, but also access for commercial and governmental purposes which could affect in the short term to aspects like a genuine formation of personal preferences or freedom of speech. For those reasons, I tend to maximize the use of the services designed to share and discuss contents when they refer to my public activity, while minimizing the exposure of my privacy sphere. The use of public-key encription can help to keep communications private and to ensure the authenticity of the source; available it is my encription key.