If you ship an API key in your application it is trivial for a hacker to fish that key out of the application binary or wire protocol.
The user API is immune to this problem, user approves the application and then gets an dedicated API key generated.