Avesh, the LinkedIn user who raised the issue, shared that the unexpected order was delivered in his name and paid for by his family without confirmation, as they believed it was legitimate. He emphasized that he had not placed any such order and asked Blinkit to verify his account history to confirm the absence of any such transaction. Highlighting a potential misuse of his personal information, he questioned how someone could successfully place an order using his name, phone number, and address without his knowledge or consent. Avesh expressed serious concerns about Blinkit’s data security and urged the company to investigate who might have misused his information and how such a breach could occur.
He further demanded accountability from the platform, asking whether Blinkit ensures the security of customer data or treats such breaches lightly. In response, Blinkit issued a public apology in the comments of the post, stating that they take such matters seriously and requested Avesh to share his registered contact number or order ID via their support email to investigate further.
The incident also sparked broader concerns in the comment section, with one user suggesting that Blinkit should implement an OTP verification step before completing deliveries, especially for COD orders. The user reasoned that this could serve as an additional layer of protection to prevent fake orders and unauthorized deliveries, and improve overall customer trust. The incident has raised questions about the vulnerability of customer data and the need for better verification mechanisms in quick commerce platforms like Blinkit.