but it's too far from the topic.
No it's not. It's exactly beside the topic. If your application is going to lock up files in your vault, then I want to know how your application is going to determine what file is a threat and what analysing will take place because when you're dealing with self replicating files, you will need stronger methods than some shoddy MD5 check. You still haven't told us what these checks consist of, yet you are seem adamant to lock a users files in a vault before considering this step. This raises suspicion. Don't you think?
if i try to get the poin ur quot, u want say, any software can lock the file or restrict access the file are ransomware. I disagree with that coz many apps can lock files but are not detected as ransomware by avast. if i following ur opinion, winrar is a ransomware also, exelock by kakasoft is also ransomware
Don't be trying to manipulate my words, but essentially that is exactly what I am saying. When an application takes a file from one position and shelves it inside some protective storage database/vault, and bleaches the original file from the system. Then that is ransomware because only your application will decide whether that file will be unlocked and released from your storage vault, and only by the will of your application. I am not just talking about
just locking a file, but holding it hostage from its user and the rest of the filesystem where it belongs. That is ransomware. And we have no proof that you or another reader are not going to do this. As Skydiver already said, helping someone to build an AV can be also used for malicious purposes :
The same technology that is used for making AVs can also be used to make viruses and ransomware.
if i following ur opinion, winrar is a ransomware also, exelock by kakasoft is also ransomware
Don't be a dumb shit all your life. Reread what I wrote before making silly statements :
Call it what you want, but any file that gets locked into a vaulted folder or archive is essentially ransomware, especially if your application is the deciding factor on whether the file will ever be released or not.
WinRar, 7Zip, and alike are zipping tools and considered white listed applications by various AV companies and they don't violate a users rights to files on the filesystem. What gets zipped can be unzipped by the user and they allow the user full control over the contents being zipped and unzipped. If a user zips an archive with a password, only that user who zipped it will be able to unzip it. These applications do not violate a users right to access their files before or after zipping. Your application could violate those users rights to access files on their system; thus holding them to ransom. As I already explained to you, we do not know the true intentions of your application or those who follow this topic at a later date.
If you want to create a legitimate AV, then go and educate yourself on the subject, because I highly doubt anyone here will be willing to give any further information on this subject. If your application was not malicious, it wouldn't be getting swallowed up for violating safety standards which raises red flags to other AV software(s). I'll park this one here.