Why shopping at JointHealing is safe

Why Shopping at JointHealing.com is Safe

News Break!


Visa, MasterCard, and AMEX introduce "zero-liability" online shopping. For more details, see:



In addition, we have received this award:

We are committed to ensuring that you have an informative and safe shopping experience at JointHealing.com. Some people still worry whether shopping over the internet is safe; let us assure you that the answer is a resounding YES! For more details, read on.

At JointHealing.com, we use the most advanced security measures to protect your personal information, as well as credit card number. By shopping at our online store, your credit card is encrypted right at your computer, before it even travels across the Internet.

Reasons why shopping at our site is extremely safe include:

  • Your credit card information is specially encoded ("encrypted") at your computer before it ever reaches the Internet. Learn more.
  • The encryption techniques used by our site and your browser are very secure. Learn more.
  • There are far easier ways for criminals to steal credit card numbers than by trying to catch them on the Internet. Learn more.

With the encryption measures we use, it would be virtually impossible for anyone to read your credit card number while it is being sent from your PC to our order processing system. We believe that this easy, time-saving way for you to make purchases from the comfort of your home or the convenience of your office is much safer than most conventional methods. So sit back, relax and shop with confidence. It is far safer to order online from us than it is to pick up the phone and order a pizza! Learn more.

How Your Credit Card Information is Protected

The order processing system only accepts information from secure browsers (such as FireFox, Netscape Navigator, Internet Explorer, AOL browser, etc). These browsers encrypt the information they send using a networking protocol called Secure Sockets Layer (SSL) which scrambles the data to prevent anyone who may intercept the information from reading it. The entire order processing session, customer information, addresses, purchase selections and credit card information is protected in transit over the Internet by the SSL technology. Thus, before your information ever leaves your PC, it is encrypted and protected by our security measures.

TIP: Look for an icon depicting a lock or a key in your browser's window for assurance that your order processing session is protected by SSL.

In addition, your credit card information remains within a secured database in this order processing system. This is in stark contrast to using your credit card at dozens of local shops, restaurants and gas stations, where your credit card number is in the hands of hundreds of people you don't know very well or may wind up on slips of paper in dumpsters accessible to people you don't know at all.

Encryption: How much security is enough?

Any encryption scheme is vulnerable to attack through a brute force approach by a determined individual or organization given enough time and resources. The amount of time and the cost of those resources varies exponentially with the length of the key used to scramble the data. However, with the encryption algorithm and key lengths we use (it's the same technology the Defense Department uses to protect secret transmissions), it would take either a long time or a lot of resources, both of which work against a criminal enterprise. If it's not cost effective to steal something, criminals don't bother or give up quickly.

Attackers have to apply every possible combination of bits in the key (which is typically in the range of tens to thousands of bits long) to complex mathematical calculations that take a certain amount of time to run through, until they find the matching key. Keys for securing credit card numbers in Internet traffic are sufficiently strong at 40 bits. While most browsers support 40-bit SSL technology, our secure servers are capable of supporting up to 128-bit SSL.

A 40-bit key, on the other hand, is a number between 1 and 1.2 trillion, so correctly finding a 40-bit key could take just over a trillion guesses, plus a few hundred billion more — we're talking way beyond lottery chances here — very slim for a stab-in-the-dark approach. In addition, since most browsers use a 128-bit key, that's a number between 1 and 34,028,236,000,000,000,000,000,000,000,000,000,000!

Even the most powerful computers in the world would take weeks to crack a 40-bit code. Essentially, our encryption techniques are strong enough that it isn't worth anyone's time or effort to even try to crack them. They could never earn enough from your stolen card to repay the cost of stealing it this way (those powerful computers are VERY expensive!!), and there are much easier methods to steal credit card numbers that don't involve the Internet or robust security measures.

Why There Are Easier Ways to Steal Credit Cards

The value of any stolen credit card to a thief is the credit limit on that card minus the outstanding balance. For most cards that amounts to only a few thousand dollars and for many it's just a few hundred dollars. Once stolen and used fraudulently, a stolen card is only viable for a month or two since the consumer would notice the improper charges on the next statement and cancel the card. So, since a stolen card's shelf life is short and it's value is low, it has to be easily obtained in order to be worth stealing.

Stealing credit cards off the Internet is not easy to do. A thief would need to have:

  • a secure network, AND
  • understanding of detailed computer network protocols AND
  • network adminstrator privileges AND
  • know exactly when your order is being transmitted AND
  • know exactly what path your order would take to our computers from the thousands of possible orders AND
  • be able to reassemble your message which has been sent in many different packets.

Now, this prospective thief has gone to all this trouble just to get your information, but there's one problem — it's encrypted! So now she/he needs to break the code — this requires:

  • special software to break the code
  • undetected and unrestricted access to a computer powerful enough to break the code AND
  • an unbelievable amount of time to do all this. (weeks to years)

Once they have gone through all this trouble, all they have is just ONE credit card number. It's simply not worth any thief's effort! Most thieves steal because it's easy — there are far easier ways to steal credit cards, such as:

  • Sift through garbage cans and dumpsters to pick out bank records and credit card billing statements.
  • Work in a gas station or restaurant for a few days to get discarded credit card imprint carbons.
  • Drive around suburbs with a cheap scanner and listen to conversations of people placing phone orders on cordless phones.
  • Read the credit card number off the card of someone next to them in line in a store.
  • Pay people who work in retail stores to steal numbers from customers.

None of these options requires the investment in education, time and resources that capturing and then breaking your order form would require. Most of us readily give our credit card numbers over the phone, yet that involves more risk than using encryption over the Internet. At JointHealing.Com, we believe that shopping online is virtually one of the safest forms of shopping you can use, short of buying everything in person with cash.

Why Online Shopping is Safer than Buying a Pizza

So now, after you thoroughly understand the ins and outs of internet security on our site, let's analyze the difference between buying an item from us vs. buying a pizza over the phone:

A. Buying from JointHealing.com:

  • Your credit card information is encrypted at your computer.
  • It is sent securely over the Internet.
  • Our computers talk directly to your bank's computers, again over a secure network.
  • You receive your product at home.
  • In most cases, another human being may never even SEE your credit card information — it's all handled automatically and stored safely on our computers.

B. Buying a pizza over the phone:

  • You pick up the phone to place an order (if you're using a cordless, anybody with a simple scanner can hear your entire conversation).
  • The person at the pizza place writes down your order (and maybe sets it down somewhere, where anyone can see it).
  • Somebody else might actually process the credit card information (and toss out that slip into a garbage can where anyone could see it).
  • Your pizza delivery person delivers your pizza (and he/she also has access to all your credit card information on your credit card slip).

We hope that you can see how shopping on the internet is much safer than the way you already purchase items!

New Low Prices!! On Most Braces Limited Size Selection

Search our Site (800) 390-1114

Disclaimer: This site and information herein is provided for informational purposes only. Neither it nor the products sold here are designed to diagnose, treat, or cure any problem. You should contact your physician for further information, diagnosis, testing, or advice on how to use the information/products listed in this site. Please read our privacy policy and full legal disclaimer. We are also committed to your safe shopping experience.