• AI Biz Hour
  • Posts
  • MetaMask's Revolution: How Self-Custody Wallets Are Bridging Web3 to Real-World Spending

MetaMask's Revolution: How Self-Custody Wallets Are Bridging Web3 to Real-World Spending

Special Guest MichaelK.eth from MetaMask AI Biz Hour, June 4th, 2025

TODAY'S HIGHLIGHTS:

  • MetaMask announces acquisition of Web3 Auth to create seedless onboarding

  • The MetaMask Card: Spend crypto anywhere MasterCard is accepted while maintaining self-custody

  • Critical cybersecurity practices everyone should implement immediately

  • The "Great Pause" and how AI is impacting junior hiring in knowledge work

INTRODUCTION:

Today's AI Biz Hour brought together hosts Andy Wergedal and John Allen with special guest MichaelK.eth, Senior BD Manager at Consensys and member of the Product Safety team at MetaMask. The conversation revealed groundbreaking developments in crypto usability that solve the long-standing "off-ramp" problem while maintaining true self-custody principles. Michael's insights on cybersecurity also provided actionable advice for protecting digital assets in an increasingly dangerous online environment.

MAIN INSIGHTS:

MetaMask's Multi-Chain Expansion

MetaMask is shedding its Ethereum-only roots and embracing a multi-chain future. Michael revealed that Bitcoin support is coming soon, following the recent launch of Solana support about a week and a half ago.

MichaelK.eth: "We just launched Solana support about a week and a half ago, so it's been a really, really big uptrend on the amount of people that are seeing, like, we're going non-EVM, we're going multi-chain, and that's really the future. Interoperability."

This expansion into non-EVM chains represents a major shift for the 9-year-old codebase. According to Michael, this transformation required significant engineering effort since "MetaMask has a 9-year-old codebase. It existed before Solana existed." The team is focusing on improving the UI, UX, and performance aspects that users have been requesting, with significant updates expected in the coming months.

The Revolutionary MetaMask Card: A Deep Dive

The most exciting announcement was the MetaMask Card, which solves the long-standing problem of using crypto in everyday life without sacrificing self-custody. Unlike other crypto cards that require sending assets to a centralized exchange first, the MetaMask Card allows users to spend directly from their self-custodied wallet.

MichaelK.eth: "When you connect your own self-custody wallet to the card to use your crypto IRL, you are giving an approval for how much you would like to spend... I'm earning automatic yield through Aave and USDC."

How It Works Technically: The MetaMask Card functions through a partnership with Banks (B-A-A-N-X) as the settlement layer and MasterCard as the payment network. When a user wants to spend their crypto:

  1. The user connects their self-custodied wallet to the MetaMask Card

  2. The user sets specific spending approvals (amount limits and token types for different categories)

  3. During a purchase, the crypto is automatically converted through the Banks settlement layer

  4. The merchant receives fiat currency, while the user spends from their crypto holdings

  5. All transactions can be exported for accounting and tax purposes

Key Advantages Over Other Crypto Cards:

  • True Self-Custody: "You never sent your assets outside of your own self-custodied wallet. You still own all of your assets, and you can do whatever you want with them."

  • Account Protection: If MasterCard closes your account, your assets remain under your control, unlike with exchange-based cards

  • Multiple Wallet Support: Connect up to 5 different wallets with different spending parameters

  • Category-Specific Settings: "You could say, okay, I prefer to use wrapped Bitcoin for entertainment, and I prefer to use Ethereum for dining"

  • Lower Fees: Other crypto cards charge 2-7% in transaction fees, while MetaMask Card fees are always less than the rewards earned

MetaMask Card Comprehensive Features:

  • Earn yield on assets until the moment they're spent (through Aave protocols)

  • Receive crypto back (3% standard, up to 11% through community reward pools) on every transaction

  • Set spending limits and categories for different tokens

  • Works anywhere MasterCard is accepted (150+ million merchants globally)

  • ATM cash withdrawal support coming soon with the metal card

  • ACH payment support for bills and mortgage payments coming soon

  • Virtual card available immediately after signup for Apple Pay/Google Pay

  • No credit check required (minimal KYC for human verification only)

MichaelK.eth: "I'm living in the year 2035. Using my MetaMask card for all of my bills, all of my entertainment. And I'm getting 11% crypto back on my transactions, and I'm earning automatic yield on my accounts up until the moment spent."

Web3 Auth Acquisition for Seedless Onboarding

MetaMask announced the acquisition of Web3 Auth to eliminate seed phrases and private keys from the onboarding process, addressing a major barrier to mainstream adoption.

MichaelK.eth: "Getting rid of seed phrases and private keys is huge when it comes to mass adoption, making it super easy to manage your own credentials, and also know that there's privacy-preserving protocols all around it."

This acquisition reinforces MetaMask's commitment to removing friction points while maintaining privacy and security. The goal is to make self-custody accessible to everyone without the current technical hurdles:

MichaelK.eth: "We need to make it so that within the next few years, telling someone to come into Web3 does not involve a million steps. It doesn't involve a million extensions and security tools."

Our Sponsor Gove Bid Mike

Want to expand your business look to Gov Contracts and Grants?

Looking to tap into the $7 trillion government contracting market? GovBidMike helps businesses secure government contracts and grants. With important AI procurement rule changes coming in October 2024, now is the time to position your business. Mention AI Biz Hour for a 5% discount on services. Government contracts increasingly specify American-made AI technologies and interoperability requirements. Visit biddata.ai to learn how to navigate the complex world of government procurement.

Why Human Decision-Making Remains Essential: John Allen provided a comprehensive explanation of why current AI tools cannot truly replace human judgment:

  1. AI Built for Perception, Not Accuracy: "They're not built on accuracy, they're built on the perception of accuracy, which is very, very different than actual accuracy."

  2. The Knowledge vs. Decision Pipeline: "What you need is a machine that's able to constantly go and pull data, pull data, pull data. But then you need a person that's flexible enough to understand how to adjust this machine every time for new cases."

  3. Breaking the Learning Cycle: "If we continue to embed things in our industries that take out early-stage people, we will no longer have later-stage people... it's important that we maintain those junior positions so that they can become senior people."

  4. Real-World Context Limitations: "They're trapped inside of a box, either a phone or whatever. They have no context of the real world. They, you know, 90% of our communication's nonverbal."

Andy compared this to the historical development of technology, noting that tools like HR software "does not make decisions better than humans do. It does process information, grab and process information better than humans, because it does it faster. But it doesn't make decisions better than humans do."

The discussion highlighted examples where professionals (particularly lawyers) have been disbarred for relying on inaccurate AI outputs without proper verification, demonstrating the real-world consequences of misunderstanding AI capabilities.

Amazon's Different Approach: Interestingly, Wes shared that Amazon seems to be taking a different approach, with increased hiring of engineering interns, suggesting the company values cultural training and human judgment alongside AI tooling:

Wes: "I can only think that the way that potentially leaders are looking at it is coding agents are going to be able to help accelerate feature development and debugging and operations. But we still have to train the next generation on our culture, and then they can leverage the tooling to speed up development."

Essential Cybersecurity Practices: A Complete Protection Strategy

MichaelK.eth shared a comprehensive security framework that works across all devices and platforms. Here's the detailed breakdown:

Step 1: Remove Phone Numbers from Accounts

MichaelK.eth: "Your phone number attached to your account is being used as an account recovery method. It bypasses your hopefully super strong and unique password. It bypasses your two-factor authenticator. And it lets someone directly into your account."

SIM swapping attacks remain one of the most common attack vectors, as phone companies can be easily socially engineered.

Step 2: Use Privacy-Preserving Browsers

MichaelK.eth: "Brave is Google Chrome without all the BS that Google has in Google Chrome. So you're not reporting all your searches back to Google, you're not constantly being data mined."

Brave Browser benefits:

  • Built-in ad blocking (particularly important since Google recently disabled ad blockers)

  • Privacy-preserving but maintains Chrome extension compatibility

  • Web3 native capabilities

  • Open-source code

Step 3: Add Multiple Protection Layers

  • Install uBlock Origin as an additional ad blocker, even in Brave

  • This eliminates malicious sponsored ads that appear at the top of search results

  • Particularly important for crypto searches where top results are often wallet drainers

Step 4: Implement Password Security

MichaelK.eth: "Bitwarden lets you self-host your own credentials. It lets you create strong, unique, randomly generated passwords."

Why Bitwarden over LastPass:

  • LastPass has been compromised multiple times (exposing seed phrases)

  • Bitwarden is open-source and allows self-hosting

  • Creates unique passwords for every service, preventing credential reuse

Step 5: Enable Two-Factor Authentication Acts as an additional layer even if passwords are compromised

Step 6: Digital Decluttering

MichaelK.eth: "I treat my devices like I treat my own home. Everything is organized, everything has its place, so that if something changes, I know that something is wrong."

  • Remove unused apps that may contain exploits

  • Clean up notifications and popups

  • Be vigilant about what permissions you grant

  • Question every prompt rather than automatically clicking "Allow"

For victims of wallet draining, MichaelK recommended SEAL911, a group of Web3 security advocates who help recover stolen assets in cases involving significant amounts (usually over $20,000).

MetaMask's Privacy-First Approach

Michael explained MetaMask's unique approach to user data, highlighting their commitment to not storing user information:

MichaelK.eth: "The last thing that we want to do is be liable for people's information. We've seen what's happened recently with Coinbase and the data sets that have been exploited there, even people's KYC photos."

The only data MetaMask temporarily stores (for about a week) are IP addresses, specifically for preventing DDoS attacks, and these aren't tied to wallet information. This stands in stark contrast to centralized exchanges that store extensive user data.

When asked about government requests for information, Michael was clear: "If they came to us and asked for that, the answer would be, we don't have anything."

Proof of Humanity in Web3

The discussion touched on the importance of verifying real humans in the crypto ecosystem, especially for avoiding bot manipulation:

MichaelK.eth: "The community rewards on the MetaMask card allow communities to actually perform distribution of rewards to people that they know are real human beings without having to know anything about them."

Michael noted that sometimes over 80% of activity in token airdrops and claims comes from bots and farmers rather than real users. The MetaMask Card system prevents this by requiring actual spending, creating a natural barrier to bot farming: "No one's gonna go bot and farm something where you actually have to spend in order to receive."

SEAL911 - A resource for victims of crypto theft that helps trace and potentially recover stolen assets through exchanges and legal channels. Their GitHub repository and Telegram channel provide support for victims of crypto scams.

EXPERT CORNER:

Michael Kaye's perspective on what truly matters in the crypto space goes beyond technical features:

MichaelK.eth: "If someone were to come and take everything away from me... I would still be the same exact person, I would still feel the same exact way, and I would still feel super happy talking about self-custody, talking about information, because it's really about knowledge. That's real value. Money is fake. It's worthless. It's not real, and that's especially not as real as information."

He emphasized the need to change how we onboard people into crypto:

MichaelK.eth: "Instead of talking about 100X-ing, 1000X-ing, and making a ton of money, let's try to talk about what's the point of crypto. What is decentralization? What is true ownership?"

QUICK HITS:

  • MetaMask serves as an "aggregator of aggregators" for buying crypto directly in the wallet

  • Community rewards on the MetaMask Card solve the bot/farmer problem by requiring real spending

  • Web3 needs to prioritize security education rather than focusing primarily on 100x gains

  • Privacy-preserving protocols are built into every layer of MetaMask

  • DDoS attacks are a daily occurrence for crypto platforms, requiring IP logging for protection

  • Businesses can easily accept crypto by displaying a QR code with their wallet address

  • The MetaMask Card can be used for business expenses with transaction exports for accounting

RESOURCES MENTIONED:

COMING UP:

Join us tomorrow for another insightful discussion on AI business applications with Andy and John at 12 PM ET.

CONNECT WITH AI BIZ HOUR:

CALL TO ACTION:

Review your security practices today using Michael's security thread. Remove your phone number from your accounts, install a password manager, and take control of your digital security. Join us live tomorrow at 12 PM ET for more insights on AI in business.

OUR SPONSORS:

Virtual Synergies

  • $9/hour virtual assistant services

  • English-speaking, trained professionals

  • Ideal for handling emails, calls, and administrative tasks

Reply

or to participate.