Sign In | Join Free
Home >> HelpCenter >> Safety & Security

How do I know if a supplier is reliable?

The best way to reduce fraud when trading either online or offline, is for buyers and suppliers to conduct proper due diligence before entering into any transaction. None of the suppliers on are guaranteed to be honest, so it is important to conduct proper research before commencing business. Tips on verifying your supplier :

  1. Verify the supplier's identity. For Gold Suppliers, you can refer to the Company Profile on their minister or the website of their own. You should also use other offline/online methods to verify the supplier.

  2. Verify the supplier's manufacturing/trading capability. You can also refer to the supplier’s Member Info of their manufacturing/trading capability. Ask for the supplier's bank reference letters to verify their financial credit worthiness.

  3. Order a sample first to check the quality and to ensure that the product is what you are looking for. If the product you are ordering is too large to get samples, we suggest asking the supplier’s previous customers for reference.

  4. Search for online complaints or comments about the supplier authentication and verification inspection by

  5. Look for Gold Suppliers that are long-term members on While Gold Supplier membership is not a guarantee of safety, these suppliers have passed an authentication and verification inspection by, that increases the chances of safe and positive trading experience. If a member has been a Gold Supplier for several years, then they are potentially an even better trading partner as they have a long history on our site. While we have many reliable, safe and high quality Free Members, you should always be extra careful when trading with them, as they have not been through verified in any way by You must always be cautious of using untraceable wire service transfers with suppliers (especially the free member) you do not know. These are highly risky and susceptible to fraud.

How can I keep my passwords secure and confidential?

  1. Don't reveal passwords to others
    Keep your passwords hidden from anyone who could pass them on to less trustworthy individuals.Be sure to safeguard your answers to password recovery questions (i.e. "What was your mother's maiden name?" etc.). Don't reveal these answers to others and don't choose questions with answers that are freely available on the internet.

  2. Protect any recorded passwords
    Be careful where you store the passwords that you record or write down. Don't store passwords on a file in your computer, because criminals are most likely to look there first. Don't carry passwords around in your wallet or hide them in obvious places, such as under your keyboard Don't leave a record/written message of your passwords anywhere that you would not normally leave personal information (esp. in a public place, etc.)

  3. Never provide your password via email or in response to an email request
    Any email message that requests your password or requests you to go to a website to verify your password is almost certainly a fraud. This includes requests from trusted companies or individuals. Emails can be intercepted in transit, and email messages that request information might not be from the senders they claim to be from. Internet "phishing" scams use fraudulent email messages to entice you to reveal your usernames and passwords and steal your identity. Learn more about phishing scams and how to deal with online fraud.

  4. Do not type passwords on computers that you do not control
    Computers in public places, such as at internet cafes, computer labs, shared systems, at kiosks, conferences, and airport lounges should be considered unsafe for any personal use other than anonymous Internet browsing. Do not use public computers to visit chat rooms, check online email for bank balances, business emails, or any other personal, financially-based accounts that require you to enter a username and password. Criminals can purchase keystroke logging devices for very little money and they take only a few moments to install. With these devices, malicious users can gather information typed on a computer from across the Internet—your passwords and passphrases are worth as much as the information that they protect.

  5. Use more than one password
    Use different passwords for different websites and services. If any of the computers or online systems using a particular password are compromised, all of your other information protected by that same password should be considered compromised as well.

I suspect that someone has been using my account to sign in to
Please protect your account by following these tips:

  1. Please change your password as soon as you can.

  2. Never sign in to your account by clicking on suspicious links.

  3. If you have signed in to your account using a public computer, please remember to sign out when you leave.

What is the procedure for to process disputes?

  1. Collect evidence from the buyer.

    Depending on the type of dispute, different evidence may be required. For example:

    • Payment documents (bank slip, etc.)

      • Payment via bank transfer (T/T): Must have bank stamp/chop

      • Payment via Western Union: Must include MTCN

      • Payment via online banking: Screenshot of the entire transaction page. Must include URL and payment status

      • Complete correspondence between both parties

    • Delivery documents

    • Contract or Proforma Invoice

    • Third-party inspection documents

    • Photos of products received including delivery package

  2. Case substantiated. will request the supplier to submit evidence to counter the complaint within 2-3 working days.

  3. Solution

    Will vary case-by-case.

Product Alert

Subscribe to your interested keywords. We will send freely the latest and hottest products to your Inbox. Don't miss any trade information.