Welcome to Etherpad!

This pad text is synchronized as you type, so that everyone viewing this page sees the same text. This allows you to collaborate seamlessly on documents!

Get involved with Etherpad at http://etherpad.org
__________________________________________________________________________
 CRYPTO DANCE 
__________________________________________________________________________
The cryptodance is a performative event to familiarize ourselves with different modes of encryption. Whilst  collectively embodying issues of security, privacy, safety and surveillance, we converge a technopolitical urgency for souvereignity and a desire for affinities with the body /machine~ living organisms/algoritms.

Cryptodance is developped, in august  durig the preparations of THF 2016! by an international small constellation of choreographers, hackers, dancers, .... 
They met, discussed  and wrote a choreography combining dance annotations, crypto technics and carefull somatic tactics. Goldjian and bolwerK started plotting the Cryptodance project during a  Ministry of Hacking (Esc, Gratz, Austria), where they formed  joint(ad)venture of the departement of Waves and Shadow and The  Departement of Care and Wonder. 
   

 ---------------
Contributors:  
bolwerK a transuniversal constellation  hosted by Marthe Van Dessel whois a wonderfull performer, hacker, feminist sys admin, multidisciplinary artivist.  who creates interfaces, devices &    protocols to instigate our urban and institutional hardware. She   engages  in the administrative, cultural, political dimension of   personal and  collective identities. By triggering intersubjective   alliances she confronts the 'self & other' to the commons,   co-authorship and the redistribution into the public domain.
http://www.ooooo.be/
Goldjian is a transdisciplinary researcher, dancer and multimedia artist, involved in the Femhack collective, the organisation of THF2016, and the international project Hacking with Care. As a techno-feminist, she also facilitates participatory process and mutual learning and likes to make visible, readable and malleable the processes of co-construction of knowledge. She introduces relational practices (toward humans and technologies) in digital arts and hacker culture, and creates intimate spaces toward collective emancipation. She is the founder of L'ERSE : http://lerse.net/  
Karine Rathle is a dancer, choreographer, dance scientist and technofriendly collaborator of Lerse and Attent!on som(t)a(c)tics. http://karinerathle.com/
  http://workingstill-stillworking.net/attentions-somatiques/
Ellen Foster  is a research fellow at the Institute for Advanced Studies in Science  and Technology Studies (STS) in Graz, Austria. Currently working on her  doctorate, she is also an artist and educator. She studies public  engagements of technology particularly within hacker cultures, and in  connection to feminist epistemologies. 

http://sts-gradstudents.wp.rpi.edu/
Marthe Van Dessel is an activist /performer who creates interfaces, devices & protocols to instigate our urban and institutional hardware & software. She engages in the administrative, cultural, socio-political dimension of personal and collective identities. By triggering intersubjective alliances she confronts the 'self & other' to the commons, co-authorship and the redistribution into the public domain.
Margaret Westby, is a technofeminist dancer, multimedia artist, and researcher, interested in the relation between movement, technology, and gender. Her PhD thesis, Empowering the Female Machine: Remapping Gender Dynamics in Technologically Augmented Dance Performance, makes a mess of dance through feminist Science and Technology Studies (STS). Her artistic practice explores the moving body's relationship to digital technologies and the performativity of all entities in play. 
http://www.mjmwestby.com/
in conversation with
Nikos Chandolias. is a tech designer, dancer, passionate with interactive multimodal applications and responsive spaces that begin from the person and expand and interpolate with the environment. He collaborated with goldjian and margaret in her phd work piece. http://www.nikoschandolias.com/  
Stephanie Castonguay is a sound artist, works with radio & wearables. http://www.spacedataspace.com/
Christina Dunbar-Hester researches technology, activism, and culture. She currently hails from southern California. http://uscannenberg.devcloud.acquia-sites.com/faculty/communication/christina-dunbar-hester  

-----------------------------
WHAT
 - communicating what cryptography is 
 - embodying issues of security, privacy violation, surveillance
 - creating a choreography which can be reproduced 
 - open form of discussion, support each other, solidarity, emanicaption to develop trust  

WHY
- introduction to digital human rights
- technical familiarizartion as a poltical stance 
- using secure technology and developing careful practices.
- ...

HOW
- Attent!on som(t)a(c)tics; Warm up: trust yourself: 
- Praxis: Constitute collective identity
- Expose information, mechanics (algoritm improvisation), embody
- Open discussion 
- Intractions of media/audiovisual/ sensory experiments

------- genda : ere is the actual working plans:
Panke Gallery/Flee Immeditley

HTMlles:
HF: otes: http://pad.constantvzw.org/p/cryptodance_notes Annotation: http://pad.constantvzw.org/p/cryptodance_somatics
CONTEXT] ECH -------------------------------- volution of secrecy and digital encryption teganography ttps://upload.wikimedia.org/wikipedia/commons/2/26/Polygraphiae.jpg he practice of concealing messages or information within other nonsecret text or data. ttp://www.esotericarchives.com/tritheim/stegano.htm .g Egyptian secret code / glazing pottery: keep secret of craftmanship .g Darius, tattoos on a slave's head, shave when arrive ryptography istory: http://www.secretcodebreaker.com ransposition + Disposition ontext:https://www.youtube.com/watch?v=YEBfamv-_do&list=PL87386AD236727A1B&index=8 ysterious link: icada3301: http://cicada3301.org/theories/ elf-defense digital right ttps://ssd.eff.org/ ttps://www.cryptoparty.in/learn/handbook ttps://tacticaltech.org/ ANCE _________ tml: https://crypto.dance/ RYPTO DANCE PERFORMANCE TEAM SHOW | 2. ANKARA DANCE FESTIVAL: https://www.youtube.com/watch?v=sbZlGdD4joU onnecting Hip-Hop and Coding http://dmlcentral.net/watchworthy-wednesday-connecting-hip-hop-coding/ ser interface gestures: Unpatentable Multitouch Aerobics from liat berdugo: https://vimeo.com/135735680 apanes algoritm dance: https://www.youtube.com/watch?v=jdDd7Csl5vc avity & bodysearch:https://en.wikipedia.org/wiki/Body_cavity_search elf defense: http://www.phillyspissed.net/node/12 ems game: http://www.regles-de-jeux.com/regle-du-kems/ lanaetary dance: Ana Halprin http://www.starve.org/177_Halprin/index.html tring theory dance (waves) lassical ballet: tombez pas de bourrez glissade mca: https://www.youtube.com/watch?feature=player_detailpage&v=Hn6zAIQnGxM#t=46 ndigenous folkloric dance: kathakali artial Arts natomical language ign language, Old Wise Corn: https://www.youtube.com/watch?v=A1-BQx0z0SU ody Surf: https://www.youtube.com/watch?v=xjm25xAijGg uddle Anna Forti: https://www.youtube.com/watch?v=dydnx1g_ZhI afé Müller - Pina Bausch: https://www.youtube.com/watch?v=WZd2SkydIXA eldenkreis: eferences: ate siccio: live coding hacking - code +movement :http://blog.sicchio.com/works/hacking-choreography/ ery famous 70s chemistry teaching explaining protein synthesis with students and movement: https://www.youtube.com/watch?v=u9dhO0iCLww - erce cunnigham Suite by Chance: http://www.moma.org/collection/works/95749 he negociation of public wikis https://vimeo.com/14401061 Anne Goldenberg and Noemie Nicolas creensavers, sleep mode, hibernate, standby or off. http://www.hit-studio.co.uk/this-book-is-a-classroom/ by bolwerk ome is a server, http://areyoubeingserved.constantvzw.org/Home_server.xhtml ance annotations move/dance theory) ttps://en.wikipedia.org/wiki/Dance_notation#/media/File:Zorn_Cachucha.jpg ttps://en.wikipedia.org/wiki/Beauchamp-Feuillet_notation aban https://en.wikipedia.org/wiki/Labanotation HOREOGRAPHY software OM: http://www.historyofinformation.com/expanded.php?id=2350 otiongram:http://user.uni-frankfurt.de/~griesbec/LABANE.HTML yesweb:http://www.infomus.org/eyesweb_ita.php sadora:http://troikatronix.com/isadora/about/ lgorithmic dancers:- https://github.com/ghing/algorithmic-dance-server algotithms through dance: http://www.bbc.co.uk/programmes/p030s6b3
https://www.youtube.com/watch?v=lyZQPjUT5B4
ysterious link: ircumambulation: https://www.google.no/search?q=hennie+onsted+oslo&ie=utf-8&oe=utf-8&gws_rd=cr&ei=98FMV_61MsuesAG6pJjQAQ thnochoreology: embodiying larger process ?


----------------------------------------------------------------------------------------------------------------------------------------------------------------------------

== CRYPTODANCE 1.0  THF STUDIO XX ==



----------------------------------------------------------------------------
DRAMATURGY
----------------------------------------------------------------------------

> welcoming/hosting
> discussion: write on paper, don't articulate

ANNOTATION, K & M. guiding
http://pad.constantvzw.org/p/cryptodance_somatics

# Alice & Bob

CONSTITUTE a singular body / SELF / in interaction with the other
trust - saftey - security
Somatic Exercises

guided by 
mazdazan breathing exercises: http://www.mottodistribution.com/shop/mazdaznan-health-breath-culture-first-six-exercises.html
handshake: https://hackingwithcare.in/wiki/doku.php/maozada
spatial design on the hand translation into movement by the other 
palm on palm - leading and following
weight sharing  

# Becoming eve : 
surveillance
Control  Gaze: Into the frequency of light

> Develop your own gaze (body stands still,only move your eyes)
> Spatial awareness - body awareness- global awareness (subjects, objects, space, time, particles, waves)
    Start moving. Start following somebody. Start followig someone else. 
    Follow 2 people or moving in your eye radius 
> Body check with sound devices (frontal) <> (back)

 
# Public key technology 
Encryption tactics whilst constituting a collective body of trust
Diffie Helman Key exchange

> each 'body creates a private key: 
    agreeing in group about a choreographic 'sentence'
> each body accepts a public movement:
   a gesture - walking, jumping, zooming in/out, knealing, swirling, 
> each body adopts the public private 'movement' of the other 
    the exchanges happens one by one, the first  person of the other, 
> each body adds it's own private key
    integration of the private choreographic sentence 

- open form of discussion, support each other, solidarity, emanicaption to develop trust  


----------------------------------------------------------------------------------------------------------------------------------------------------------------------------


== CRYPTODANCE 2.0  HTMlles12 ==


Description
Cryptodance is a performative event to collectively embody issues of security, privacy, safety and surveillance and to familiarize ourselves with differents modes of encryption (ciphering and deciphering messages) by careful somatic tactics, dance scores and electronic devices.  

Cryptodance instigates a technopolitical urgency for souvereignity and a desire for affinities between the body and machine. " (bolwerk)

Cryptodance is a performative event to collectively embody issues of security, privacy, safety and surveillance. Together we familiarize ourselves with differents modes of encryption (ciphering and deciphering messages) by careful somatic tactics, dance scores and electronic devices. 
Goldjian and bolwerK started plotting the Cryptodance project during a  Ministry of Hacking (nov 2014, Esc, Gratz, Austria), where they formed joint(ad)venture of the departement of Waves and Shadow and The Departement of Care and Wonder. 
Cryptodance was developped in august 2016  during the preparations of THF 2016! by an international small constellation of choreographers, hackers, dancers, .... 
They met, discussed  and wrote a choreography combining dance annotations, crypto technics and somatic tactics. 
A first performative event occurred during the THF august 20th at STUDIO XX.  http://www.ooooo.be/cryptodance

Collaborators: bolwerK, Marthe Van Dessel, Goldjian, Karine Rathle, Ellen Foster, Margareth Westby, Nikos Chandolias, Stéphanie Castonguay, Christina Dunbar-Hester
Cryptodance est un événement performatif qui vise à incarner collectivement les questions de sécurité, de confidentialité de sécurité et de surveillance et à nous familiariser avec différents modes d’encryption (chiffrement et déchiffrement des messages ) par un soigneux agencement de tactiques somatiques, de partitions de danse et d’appareils électroniques. 
Cryptodance appelle ardemment à une souvereineté technologique et un désir d'affinités entre le corps et la machine.” (bolwerk)

Cryptodance est un événement performatif qui vise à incarner collectivement les questions de sécurité, de confidentialité de sécurité et de surveillance. Ensemble, nous nous familiarisons avec différents modes d’encryption (chiffrement et déchiffrement des messages) par un soigneux agencement de tactiques somatiques, de partitions de danse et d’appareils électroniques. 
Goldjian et bolwerK ont commencé à comploter ce projet de Cryptodance au cours du Ministry of Hacking (nov 2014, Esc , Gratz , Autriche) , où elles ont formé une joint-vonture entre The Departement of Waves and Shadow and The Departement of Care and Wonder.  La Cryptodance a ensuite été développé en août 2016 lors de la préparation de THF 2016 ! par une petite constellation internationale des chorégraphes , des pirates , des danseurs . Iles se sont rencontré ont discuté et écrit ensemble une chorégraphie combinant une partition de danse, des techniques cryptographiques et tactiques somatiques .
Un premier événement performatif a eu lieu au cours du THF le 20 aout au Studio XX : http://www.ooooo.be/cryptodance

Collaboratrices/eurs: bolwerK, Marthe Van Dessel, Goldjian, Karine Rathle, Ellen Foster, Margareth Westby, Nikos Chandolias, Stéphanie Castonguay, Christina Dunbar

No prior knowledge of dance or encryption is required but any of them is welcome.
max: 30 people

  (*description to be adjusted and translated in French)
1. One sentence clearly explaining what people who have NO idea of what encryption is (and how it can be linked to dance) should expect from this workshop.
2. One sentence clearly explaining the requirements for participants.
3. We need you to please provide the information for the “Practical info” section:
4. Please confirm the images Martine created for Femhack activities are

The FemCrypt Fest is a bilingual (FR/ENG) activity. 
To register or have more information about the Cryptodance and/or FemCrypt please contact: EMAIL
5.  Please clarify to us: do participants have to attend both events, the  crypto dance workshop and the femcrypt? In any case, we believe it is  necessary to re-arrange the info.

CONTACT
STUDIO 303
content: miriam.ginestier - Directrice Artistique et Générale, Studio 303 372 Ste-Catherine Ouest, Montréal, QC - miriam.ginestier@studio303.ca
technics: technique@studio303.ca
STUDIO XX -HTMLLES



Material list
magareth :
     1. little pico projector  
     2. video camera  
     3. another video camera  
     4. epson bigger projecter  
     5. microphone 
     6. smartphone for audio
     anne
     1. audio recorder (to check)
     2. tablet/ i phone
     3. laptop with presentation


----------------------------------------------------------------------------
DRAMATURGY 2.0
----------------------------------------------------------------------------

legend
@ online
() on paper 
-> intention
>  exercices <
[ screenings ]
<  movements >
<< sounds  >>
   
   
(1) Identification            10m                 18-45 19:00  
 Sign Terms and Condition 
 @ online ? http://pad.constantvzw.org/p/cryptodance+terms&conditions
 Give your ISP - Get your IP address

> Identification on machine level happens on MAC Address: not IP (that is network communication) 

(2) Welcome  10m                          - 19:05-19h15 - 

 What to expect :
       - Participation and respect
       - Intention
       - performative event plan
() to be included in terms and conditions ? 
() Printed on a sheet () along with program ?
  
<< Heart bits, triggered by some sensors >>
  
[ live videostreaming ]


(3) History of encryption   15 m                         -  19:15-19h30  
[ computer d : command lines/presentation]
[ live video streaming ]  

(4) Start Up body and machines    15min                                    -  19:30 - 19:45  

<< dedicated sound for warming >>
<< heart bits (?) >>

[ live videostreaming ]

< warming exercices guided by Karine>
 


(5) SURVEILLANCE REALM                10min                                   -  19h45  -  19h55   
-> intention:
-> feel the climate of our SURVEILLANCE REALM            
-> make the habits visibles
     
<walk and feel  eyes closed  >


<< loops of recordings  >>
<< heart bits  >>

[  computer d : google/NSA/cookies/ ]
[ live videostreaming ]



(6) BUILDING TRUST                                  20min               -  20:00  -  20:20    - -> 

Move from cynism, deny, fatalism, toward a web of trust ?
-> CONSTITUTE a singular body / SELF / in interaction with the other
-> Introduce # Alice & Bob
-> enhance trust & safety    vs   State Corporate Security 
-> Develop a web of Trust (within human, between human and technologies)

> guiding with hands <
>  weight sharing <
<< heart bits  >>

[ live videostreaming ]

(7) EXTENDING OUR GAZE   20min                                          -  20:00  -  20:20   
-> Becoming EVE
 
>  playing with object and people  < 
>  Develop your own gaze (body stands still,only move your eyes)   <
> Spatial awareness - body awareness- global awareness (subjects, objects, space, time, particles, waves)
    Start moving. Start following somebody. Start followig someone else. 
    Follow 2 people or moving in your eye radius 
> open form of danced discussion, support each other, solidarity, emancipation to develop trust  

<<sounds from objects>>>
<< heart bits  >>

[ live videostreaming ]
 
 (8) INSTALLING TOR    ( The Onion Router )                                    40 min                                        -  20:20  -  21:00   
-> anonymising online browsing
-> understand IP address distribution/hiding (recollection)

> form groups:
     Eve : get survaillence devices
     Alice & Bobs: connect to the network through your personal / instituional ISP provider >
     develop a phrase for your ip group
     dance the sentence to/from the servers (wooden plates), who create a network
     
> Install TOR software from servers/plates <
 1) get an onion
 2) install the onion on yourself (you may dance slower)
> Use TOR network <
 1) create a ip sentence with the onion
 2) dance the sentence to/from TOR servers (basket plates)
> IP Dance with/without TOR   <

<< heart bits  >>

[ live videostreaming ]

(9) DIFFIE HELLMAN     PUBLIC KEY SIGNING                                       40 min                                -  21:00   -  21:40   -                

-> built trust toward public key signing
-> developp trust among each other (know that I am I and U are U)
- encrypt content (not 
> each 'body creates a private key: <
    agreeing in group about a choreographic 'sentence'
> each body accepts a public movement: <
   a gesture - walking, jumping, zooming in/out, knealing, swirling, 
> each body adopts the public private 'movement' of the other <
    the exchanges happens one by one, the first  person of the other, 
> each body adds it's own private key  <
    integration of the private choreographic sentence

<< heart bits  >>

[ live videostreaming ]
(10) Cool Down and DEBRIEF                                                        20 min                            -  21:40       22:00  -             

> cool  <
 < Debrief in circle  <
- Discussion with paper


////////////////////////////////////////////////////////////////////////////////////


----------------------------------------------------------------------------------------------------------------------------------------------------------------------------

== CRYPTODANCE 1.2  Panke ==

@panka part of transmediale vorspiele, 15th-18th
http://www.pankeculture.com/
https://vorspiel.berlin/
http://www.fleeimmediately.com/vorspiel-2017.html

Meeting: monday : 16:00  (10am Montreal) 23th   -  16:00  (10am Montreal) 30th January -  16:00  (10am Montreal) 30th January  -  16:00  (10am Montreal) 6th of February -  16:00  (10am Montreal) 13th of February  

task
   ext communication: marthe (rennee) - (CC - all)
   internal commuication: ellen
   technical setup interface- marthe
    remote involvement - margareth
    script girl - ellen
    bodydocryptovoicec: ellen
-------------------------------------------------------------------
Since we only have an hour, can shorten introduction, shorten the different exercises

The cryptodance is a performative event to familiarize ourselves with different modes of encryption. Whilst  collectively embodying issues of security, privacy, safety and surveillance, we converge a technopolitical urgency for souvereignity and a desire for affinities with the body /machine~ living organisms/algorithms.Cryptodance is developed by an international small constellation of choreographers, hackers, dancers, .... (bolwerK, Goldjian, Karine Rathle, Ellen Foster, Marthe Van Dessel, Margaret Westby,..). They met, discussed  and wrote a choreography combining dance annotations, crypto technics and careful somatic tactics
-----
http://www.ooooo.be/cryptodance


----------------------------------------------------------------------------
INTENTION
----------------------------------------------------------------------------

-  Focus on calming people, making them feel safe, while they are being surveilled and their data is being used in unknown ways
-  Embodiment as calming, trust building. Trusting yourself so that you can open up and trust others as well as trust the infrastructure and the technologies surrounding us.
-  For me, focusing on the fact that it's not just who but *what* is  watching you [per the last point] is of particular interest. How  quickly we trust the technology and infrastructure without thinking  about the embedded politics or sociotechnical dynamics.
-   Maybe having some data/secret/personal information that everyone writes down on waiver and gives away? Gate keeping strategy where they cannot take part unless they give away some personal/private info?
-   Make it playful
-   Sharing of keys, or trying to share the public keys. To me this will be the most difficult part, how to enact this? Group exchange like we did before? Is there time?

ENTRANCE

PERFORMATIVE INTERFACE

----------------------------------------------------------------------------
DRAMATURGY 1.1
----------------------------------------------------------------------------

-  Have them all sign form?  waiver / "I agree"  'No thanks'  gesture.
see : http://pad.constantvzw.org/p/cryptodance+terms&conditions  

Hallo (in eigen taal)
https://termsfeed.com/blog/wp-content/uploads/2016/09/add-i-agree-to-terms-checkbox.jpg
I agree
<introduction>
<blind fold>
hello, who are we? version 1.2 : montréal thf/htmelles
Together we familiarize ourselves with ciphering and deciphering  messages by careful somatic tactics, dance scores and electronic  devices. 
performative event 
<book: We would like to learn, and we are working on a book. This book is a classroom>
<action; pass book + read little text  http://www.passengerbooks.com/stage/order.php?page=tb >

some historical exemples of cryptography and secret writing:
(steganography, substitution, transposition) > shift through technology (who is who) (which machine is which machine)
<film: https://www.youtube.com/watch?v=YEBfamv-_do 2:05 >

<picture: old apple logo> https://images.duckduckgo.com/iu/?u=http%3A%2F%2Fmedia-cache-ec0.pinimg.com%2F736x%2Fbe%2F07%2F9d%2Fbe079d339b572c50ecf9c2a091270f4d.jpg&f=1
Alice & Bob, children of Eve an Adam, who turned in an apple. 
Zeros and Ones, Sadie Plant, which traces back a feminst history of computing 
weaving, a binary - Ada Lovelave the first woman programmer
military advancement of technology - the death of  Alan Turing who worked for IBM 
gay, death, suiscied next to him an apple!

How quickly we trust the technology and infrastructure without thinking  about the embedded politics or sociotechnical dynamics.
ask for active contributors/peformers (as many as possible) 
other people wo want to watch = eve (distant gaze)
8 min - 10 min


# Alice & Bob
CONSTITUTE a singular body / SELF / in interaction with the other
trust - saftey - security
Somatic Exercises

- environment / body (self) / massage your own hand (Alie=Alice) (Bob=Bob)
- massage each other hand, use hand to guide through the space (Alice meets Bob)

10 min


# Becoming eve : 
surveillance
Control  Gaze: Into the frequency of light
> Develop your own gaze (body stands still,only move your eyes)
> Spatial awareness - body awareness- global awareness (subjects, objects, space, time, particles, waves)
    Start moving. Start following somebody. Start followig someone else. 
    Follow 2 people or moving in your eye radius 
10 min

 
# Public key technology 
Encryption tactics whilst constituting a collective body of trust
Diffie Helman Key exchange

max -  8/10 people

> we adpot the public key, a movement base on the picture:
    https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#/media/File:Diffie-Hellman_Key_Exchange.svg

> each 'body creates a private key: 
    teaching group a choreographic 'sentence'   > 3 movements Alice: (123) _ Bob (567)
    
> each 'body merge private+public key'
Alice:
    (1) everybody close together 
    hands above the head grab 1th container
    hands on the height of the head grab 2th container
   (2)
   hands on the belly height grab 3th container
Swirl + 3rd container
    (3)
    bend, hands on knee height grab 4th container
    bend, hands on ground grab 5th container
    
    [we're missing the 3rd container step here ...and I think it could just come right after Swirl (almost as a part of 'Swirl') if we keep it, does it still make sense? Actually, I think that is the best option!]

    
Bob:
    hands above the head grab 1th container
    ( 4 ) arms crossed on shoulders
    hands on the height of the head grab 2th container
   hands on the belly height grab 3th container
   ( 5 ) spin, stomp
    Swirl + 3rd container
    bend, hands on knee height grab 4th container
    ( 6 ) hip rotate
    bend, hands on ground grab 5th container

    
-------------------------------------------------------------------------------
PUBLIC KEY EXCHANGE 
--------------------------------------------------------------------------------
> each body adopts the public private 'movement' of the other 
    the exchanges happens one by one, the first  person exchange another
> each body adds it's own private key
    integration of the private choreographic sentence 
    
    
    (1)
    hands above the head grab container 1
    ( 4 )
    hands on the height of the head grab 2 container
   (2)
   hands on the belly height grab 3 container
   ( 5 )
    Swirl
    (3)
    bend, hands on knee height grab 4th container
    ( 6 )
    bend, hands on ground grab 5th container

3 0min


-------------------------------------------------------

FINISH txt:

_arms parallel and reaching upwards; hands just above head; hold top container
_hands at head-level; same width apart; hold second container
_hands at shoulder-level; same width apart; hold next container
_arms wave to the left; step sideways
_slightly bend knees, hands at shoulder-level; hold fourth container
_keep knees slightly bent, hands at belly level; hold sixth container

[What happened to the 5th container step?]


-------------------------------------------------------

to do 
prepare presentation + slides



-------------------------------------------------------
tools /

jitsi
http://utox.org/
http://matrix.org/
https://disroot.org/