About isono.my

Applying the principle of Isonomia — Equality of Law — to technical infrastructure and public policy audits.

The Principle of Isonomia

Isonomia — from the Greek isos (equal) and nomos (law) — is the concept that all entities, whether individuals, organizations, or algorithms, are subject to the same set of rules. No exceptions. No backdoors. No privileged pathways.

In practice, this principle demands three things:

  • Code as Supreme Custom: If it isn't defined in the repo, it doesn't exist. Policy must be verifiable, not aspirational.
  • Symmetry & Parity: Dev environment equals production environment. No "special cases." The rules that apply to one must apply to all.
  • Radical Transparency: Logic must be auditable. Whether it's a Kubernetes network policy or a DBKL tax bracket, the reasoning must be visible and testable.

The symbol is a structural Delta (Δ). In system architecture and version control, a Delta represents the diff: the exact measure of continuous change between two states. The gap in the left boundary is a deliberate architectural choice: it represents an 'Open Port' or an open API, rejecting the 'Closed Loop' or 'Walled Garden' mentality of legacy infrastructure. The floating horizontal apex (the 'hat') signifies a detached hard-limit; the ceiling of the system is no longer hard-coded, allowing for dynamic scaling. Within the isono.my framework, this is not just a personal motif — it is the schematic for an Isonomic system: radically transparent, constantly integrating new logic, and structurally open to inspection.

How Audits Work

Each audit on this site examines a policy, practice, or piece of infrastructure through the lens of Isonomia. The question is always the same: Does this system treat everyone equally under its own rules?

The verdict is binary:

  • PASS — Isonomic: The logic is sound. Rules apply symmetrically. No hidden exemptions.
  • FAIL — Non-isonomic: Inequitable logic detected. The system contains structural asymmetries, exemptions, or loopholes that create privileged paths.

Every audit includes the raw data, the analytical framework, and the complete chain of reasoning. You don't have to trust us — you can verify the logic yourself.

What We Audit

Our scope spans two domains:

  • Technical Infrastructure: Network policies, access controls, identity systems, compliance frameworks, and software architectures — where "code is law" in the literal sense.
  • Public Policy: Tax structures, regulatory frameworks, licensing regimes, and government service delivery — where the principle of equal treatment under law faces its most consequential test.

Each audit is grounded in Malaysia's context but speaks to universal patterns of asymmetry that appear in every jurisdiction. New audits are added regularly — check the index or subscribe via RSS.