Hi,
There are a couple things going on that protect your users, and calls in general.
#1. You want to be using a secured certificate, it’s free and fairly simple to set up, this will handle the traffic sniffing.
#2. Each server instance has a unique server key. This server key and your data are sent over the wire as a specialized encrypted request similar to how Amazon Web Services does (using a method I will not reveal). Even if by chance someone did sniff your query (again see #1), by the time is was determined, that same request would be invalid if someone tried to reissue it.
#3. You can only delete a user with the users unique identifier. Which means a user would need to “login” first before that can even be obtained. This requires the users password which is also encrypted in the database. Not even you as the developer can determine a users password. So in essence only the user has permissions to edit and delete their own information.
#4. Use the email confirmation feature to handle valid registrations.
Generally, unless your handling some type of payment data (which you should leave to a third party) the effort it would take to mess with your users is not going to be worth it. Also, there is no way to access the user API without the Corona client.
In the event that someone was able to compromise your setup (very unlikely) then you can regenerate the server key as a last fail-safe.
Though nothing is 100% secure in todays world, hackers tend to go for targets that will reward them financially. Leave that to a third party.
If you have any other questions, feel free to ask.
-dev