Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Amrisha Prashar
on 16 October 2015

Origami Wily Werewolf Competition


In March we held a competition that asked participants to create their best version of a Unicorn Origami to celebrate our design theme for the Ubuntu Phone. With the upcoming launch of 15.10, we’d love to see your best version of Wily Werewolf using your Origami skills.

The following pdf can help you design your creations! Instructions Origami Wily Werewolf

Then all you’ll need to do once complete is:
– Take a photo of your design
– Upload to Twitter
– And use the hashtag #OrigamiWerewolf

A member of our design team will judge the best based on creativity, complexity and design. The deadline is 11:59 on Wednesday 28th October and the winner will receive an Ubuntu E5 Phone! Happy creating.

Terms_and_Conditions_Origami_WilyWerewolf

Related posts


Henry Coggill
6 June 2025

What is CMMC compliance?

Hardening Article

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies and practices within the public sector and amongst wider industry partners. ...


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...