The Xiaomi electric vehicle factory in Beijing's Daxing district has become the new Jerusalem for the American elite
Article | Sleepy.md
Starting from 2025, visiting the Xiaomi car factory in Beijing's Daxing district has become one of the top activities for American elite families to bring their children to China. Every Saturday afternoon, at the factory gate, you can always see American parents speaking English with their children, waiting in line to enter the production line of this Chinese car.
The spots for visits here are in high demand. The number of sign-ups for a single event can easily reach 4600 people, but only 20 groups of visitors can go in, with a success rate of 0.4%, comparable to Ivy League admission.
According to publicly available data from the Beijing municipal government, in just the first 6 months of 2025, the factory had received a total of 93,000 visits; by the end of 2025, this number had soared to 130,000. Visitors come from more than 70 countries and regions, including dignitaries, diplomats, multinational corporate executives, Silicon Valley investors, European venture capitalists, as well as groups of American elite families.
What exactly has turned a car production line into a popular attraction?
Paradigm Shift
For the past few decades, the Western world's perception of China has always been built on a traditional cognitive infrastructure.
This infrastructure includes the media's reporting framework (CNN or The New York Times's filter), think tank research reports (deductions on overcapacity), the division of labor theory in economics textbooks (assemblers at the bottom of the smile curve), and the cheap consumer goods labeled "Made in China" on supermarket shelves.
They all share a common core: they are all indirect.
Whether it's the stereotypical image of the "world's factory" or the grand narrative of the "Thucydides Trap," they have all been filtered through layers, packaged into specific frameworks, and then fed to the public as conclusions. For a long time, this system has firmly locked Western impressions of China into stereotypes.
However, in this factory in Daxing, it failed.
Stepping into the workshop, what greets you is an incredibly unreal silence. In the body shop where key processes are 100% automated, with a comprehensive automation rate of up to 91%, more than 400 robots and over 400 high-precision cameras work seamlessly together, achieving true lights-out production. In the press shop, a steel behemoth with a locking force of up to 9100 tons can mold 72 parts into one in just 120 seconds, with an error margin of less than a single strand of hair.

Here, on average, every 76 seconds, a new car drives off the production line.
When a Silicon Valley venture capitalist, or a Washington policymaker, stands on a glass walkway and witnesses all of this with their own eyes, they no longer need any think tank report to prove to them that "China's manufacturing is upgrading." The dry and withered numbers in the report have all turned into the robotic arms waving before them.
Refreshing the news on Twitter and standing on the walkway to see a car roll off the line every 76 seconds will lead to a significant gap in perceptions of China's manufacturing. This disparity is the largest cognitive arbitrage opportunity between China and the United States today. The smart individuals with top resources are leveraging this information asymmetry to secretly adjust their asset allocations.
Taxing During the Day, Pilgrimage at Night
In the spring of 1950, young Japanese engineer Eiji Toyoda boarded a flight to the United States, heading straight to the Ford Rouge Factory in Detroit. At that time, the Ford factory had a daily production capacity of up to 8,000 vehicles, while Toyota's annual output was a meager 40 vehicles.
It was this trip to Detroit that directly gave birth to Toyota's future production methods. Subsequently, even larger-scale actions followed. In 1955, the governments of the United States and Japan jointly launched the "Productivity Program," sending nearly 4,000 Japanese engineers to the United States to visit factories. It was an organized pilgrimage. The Japanese traveled across the ocean because they knew well of their lagging behind and the urgent need to learn.

But now, the direction has reversed.
Western elites, harboring complex emotions, fly to Beijing Daxing. There is no government organization, no national endorsement, and against the backdrop of a tariff war, this trip even seems quite politically incorrect. But they still come here spontaneously, privately, and stealthily.
As early as 2010, the value added by China's manufacturing industry surpassed that of the United States for the first time, ranking first globally. By 2024, the proportion of China's manufacturing value added in the world had approached 30%, equivalent to the sum of the United States, Japan, and Germany. In the field of new energy vehicles, China has shown a crushing dominance, with China's share of global new energy passenger vehicles reaching 68.4% in 2025.
On the other hand, the once pilgrimage site of Detroit has now become a desolate industrial relic. The decline of the U.S. manufacturing industry is by no means accidental but rather the bitter fruit of a forty-year period of financialization.
Since Milton Friedman put forward the theory of "shareholder value maximization" in the 1970s, U.S. companies have shifted resources from long-term manufacturing investments to aggressively pursuing short-term financial returns.
The Boeing Company is a bloody lesson. Since merging with McDonnell in 1997, Boeing's corporate culture has completely transitioned from being engineer-led to Wall Street-led. Executives were obsessed with cost-cutting through outsourcing, boosting stock prices through buybacks, which not only resulted in the tragedy of the 737 MAX but also led to the complete hollowing out of the entire manufacturing system.
Supporting tariff hikes on China during the day in Washington, then queuing up to visit a factory in Beijing's Daxing district at night. The U.S.' China strategy is based on the premise that China is a threat that must be contained, but the private actions of American elites follow a different logic: China is a reality that must be acknowledged.

Policy may be temporarily decoupled from reality, but the senses of capital and the evolution of cognition will eventually catch up with reality.
In early 2025, Spencer Gore, the founder of the U.S. sodium-ion battery startup Bedrock Materials, flew to China and visited Contemporary Amperex Technology's (CATL) factory. He saw that the Chinese battery giant was using the same production line and equipment used to make lithium-ion batteries to effortlessly produce sodium-ion batteries.
Upon returning home, he promptly dissolved the company and returned the $9 million in funding to investors.
When Toyota's Eiji Toyoda went to Detroit, it was for learning; but today's American elites come to Beijing to confirm one thing. Something they have vaguely sensed but need to see with their own eyes to truly let go of.
Serendipity
In the midst of this trend of factory visits, Lei Jun's role seems somewhat subtle.
By the end of 2024, when he decided to open up the factory to the outside world, his original intention was extremely pure and purely commercial, simply to sell cars. In an industry with high barriers to entry like the automobile industry, the most difficult gap to bridge for a brand that has crossed over from mobile phones is precisely the trust gap of consumers. Lei Jun opened the factory doors only to dispel doubts and build trust.

However, while he only intended to open this door, he unintentionally knocked down another invisible barrier.
Over the past decade, China has invested heavily in building Confucius Institutes overseas, disseminating national image advertisements, attempting to enhance soft power through cultural exports. However, such top-down, heavily official moves often easily trigger a defensive psychological backlash in the West and are even directly categorized as "propaganda tools."
When others perceive that you are trying to persuade them, their first reaction is always caution and skepticism.
In contrast, the Xiaomi factory said nothing. It didn't try to instill any values, nor did it sell any grand narrative. It was just there, quietly and efficiently, churning out a car every 76 seconds.
In social psychology, there is a theory called "intergroup contact theory," which essentially suggests that the best way to reduce prejudice against a group is not to preach to them about lofty principles but to create conditions for direct, equal contact.
In the era of information warfare, the prevailing narrative of the past decade has been that whoever controls the media narrative wins the battle of perception. China has consistently been at a disadvantage in this narrative war. However, the Xiaomi factory in Daxing tells us that when the gravitational pull of reality is strong enough, even the tightest narrative will automatically collapse. You don't need to go to great lengths to win a narrative war; you just need to open the doors and let the other side face reality head-on.
The most sophisticated soft power often arises at the moment when you never intended to influence anyone.
The Longest-Term Geopolitical Variable
As darkness falls over Daxing, the factory floor remains brightly lit.
Those American children brought by their parents to visit may already be fast asleep in the carriages heading back to their hotels. They may not yet understand what a tariff war is, grasp the concept of the "Thucydides Trap," or comprehend why their parents would expend such high costs and energy just to show them an industrial assembly line.
But their eyes will not lie, and they will remember it all.
Geopolitical analysts are always focused on aircraft carrier numbers, chip acts, and trade imbalances, but few pay attention to intergenerational cognitive transmission.
These American children, now only 8 to 15 years old, will grow up twenty years later to be Wall Street investors, Silicon Valley entrepreneurs, Washington decision-makers, or just ordinary voters. Their first impression of China will no longer be the biased filter on CNN news or the imaginary enemy concocted by politicians but a firsthand sensory memory etched by experience.
This kind of experiential-based cognition is often the most difficult to overturn because it does not need to rely on the endorsement of any third-party information source; it relies solely on their own eyes.
Twenty years from now, when they discuss China at the meeting table, what will be the first image that comes to their minds? Not cheap trinkets, not the bustling world's factory. They might recall that tranquil workshop, the tireless robotic arms under the lights, the car taking shape before their eyes in a seamless assembly.

Once this seed of consciousness is planted, it can never be uprooted.
It is a cognitive reset spanning two decades, far more unshakable than any trade deal, more difficult to reverse than any diplomatic statement. The eyes of these children are the most unpredictable yet irreversible variable in America's China policy twenty years later.
The direction of pilgrimage has truly changed.
You may also like

After the blockade of the Strait of Hormuz, when will the war end?

Before using Musk's "Western WeChat" X Chat, you need to understand these three questions
The X Chat will be available for download on the App Store this Friday. The media has already covered the feature list, including self-destructing messages, screenshot prevention, 481-person group chats, Grok integration, and registration without a phone number, positioning it as the "Western WeChat." However, there are three questions that have hardly been addressed in any reports.
There is a sentence on X's official help page that is still hanging there: "If malicious insiders or X itself cause encrypted conversations to be exposed through legal processes, both the sender and receiver will be completely unaware."
No. The difference lies in where the keys are stored.
In Signal's end-to-end encryption, the keys never leave your device. X, the court, or any external party does not hold your keys. Signal's servers have nothing to decrypt your messages; even if they were subpoenaed, they could only provide registration timestamps and last connection times, as evidenced by past subpoena records.
X Chat uses the Juicebox protocol. This solution divides the key into three parts, each stored on three servers operated by X. When recovering the key with a PIN code, the system retrieves these three shards from X's servers and recombines them. No matter how complex the PIN code is, X is the actual custodian of the key, not the user.
This is the technical background of the "help page sentence": because the key is on X's servers, X has the ability to respond to legal processes without the user's knowledge. Signal does not have this capability, not because of policy, but because it simply does not have the key.
The following illustration compares the security mechanisms of Signal, WhatsApp, Telegram, and X Chat along six dimensions. X Chat is the only one of the four where the platform holds the key and the only one without Forward Secrecy.
The significance of Forward Secrecy is that even if a key is compromised at a certain point in time, historical messages cannot be decrypted because each message has a unique key. Signal's Double Ratchet protocol automatically updates the key after each message, a mechanism lacking in X Chat.
After analyzing the X Chat architecture in June 2025, Johns Hopkins University cryptology professor Matthew Green commented, "If we judge XChat as an end-to-end encryption scheme, this seems like a pretty game-over type of vulnerability." He later added, "I would not trust this any more than I trust current unencrypted DMs."
From a September 2025 TechCrunch report to being live in April 2026, this architecture saw no changes.
In a February 9, 2026 tweet, Musk pledged to undergo rigorous security tests of X Chat before its launch on X Chat and to open source all the code.
As of the April 17 launch date, no independent third-party audit has been completed, there is no official code repository on GitHub, the App Store's privacy label reveals X Chat collects five or more categories of data including location, contact info, and search history, directly contradicting the marketing claim of "No Ads, No Trackers."
Not continuous monitoring, but a clear access point.
For every message on X Chat, users can long-press and select "Ask Grok." When this button is clicked, the message is delivered to Grok in plaintext, transitioning from encrypted to unencrypted at this stage.
This design is not a vulnerability but a feature. However, X Chat's privacy policy does not state whether this plaintext data will be used for Grok's model training or if Grok will store this conversation content. By actively clicking "Ask Grok," users are voluntarily removing the encryption protection of that message.
There is also a structural issue: How quickly will this button shift from an "optional feature" to a "default habit"? The higher the quality of Grok's replies, the more frequently users will rely on it, leading to an increase in the proportion of messages flowing out of encryption protection. The actual encryption strength of X Chat, in the long run, depends not only on the design of the Juicebox protocol but also on the frequency of user clicks on "Ask Grok."
X Chat's initial release only supports iOS, with the Android version simply stating "coming soon" without a timeline.
In the global smartphone market, Android holds about 73%, while iOS holds about 27% (IDC/Statista, 2025). Of WhatsApp's 3.14 billion monthly active users, 73% are on Android (according to Demand Sage). In India, WhatsApp covers 854 million users, with over 95% Android penetration. In Brazil, there are 148 million users, with 81% on Android, and in Indonesia, there are 112 million users, with 87% on Android.
WhatsApp's dominance in the global communication market is built on Android. Signal, with a monthly active user base of around 85 million, also relies mainly on privacy-conscious users in Android-dominant countries.
X Chat circumvented this battlefield, with two possible interpretations. One is technical debt; X Chat is built with Rust, and achieving cross-platform support is not easy, so prioritizing iOS may be an engineering constraint. The other is a strategic choice; with iOS holding a market share of nearly 55% in the U.S., X's core user base being in the U.S., prioritizing iOS means focusing on their core user base rather than engaging in direct competition with Android-dominated emerging markets and WhatsApp.
These two interpretations are not mutually exclusive, leading to the same result: X Chat's debut saw it willingly forfeit 73% of the global smartphone user base.
This matter has been described by some: X Chat, along with X Money and Grok, forms a trifecta creating a closed-loop data system parallel to the existing infrastructure, similar in concept to the WeChat ecosystem. This assessment is not new, but with X Chat's launch, it's worth revisiting the schematic.
X Chat generates communication metadata, including information on who is talking to whom, for how long, and how frequently. This data flows into X's identity system. Part of the message content goes through the Ask Grok feature and enters Grok's processing chain. Financial transactions are handled by X Money: external public testing was completed in March, opening to the public in April, enabling fiat peer-to-peer transfers via Visa Direct. A senior Fireblocks executive confirmed plans for cryptocurrency payments to go live by the end of the year, holding money transmitter licenses in over 40 U.S. states currently.
Every WeChat feature operates within China's regulatory framework. Musk's system operates within Western regulatory frameworks, but he also serves as the head of the Department of Government Efficiency (DOGE). This is not a WeChat replica; it is a reenactment of the same logic under different political conditions.
The difference is that WeChat has never explicitly claimed to be "end-to-end encrypted" on its main interface, whereas X Chat does. "End-to-end encryption" in user perception means that no one, not even the platform, can see your messages. X Chat's architectural design does not meet this user expectation, but it uses this term.
X Chat consolidates the three data lines of "who this person is, who they are talking to, and where their money comes from and goes to" in one company's hands.
The help page sentence has never been just technical instructions.

Parse Noise's newly launched Beta version, how to "on-chain" this heat?

Is Lobster a Thing of the Past? Unpacking the Hermes Agent Tools that Supercharge Your Throughput to 100x

Declare War on AI? The Doomsday Narrative Behind Ultraman's Residence in Flames

Crypto VCs Are Dead? The Market Extinction Cycle Has Begun

Claude's Journey to Foolishness in Diagrams: The Cost of Thriftiness, or How API Bill Increased 100-Fold

Edge Land Regress: A Rehash Around Maritime Power, Energy, and the Dollar

Arthur Hayes Latest Interview: How Should Retail Investors Navigate the Iran Conflict?

Just now, Sam Altman was attacked again, this time by gunfire

Straits Blockade, Stablecoin Recap | Rewire News Morning Edition

From High Expectations to Controversial Turnaround, Genius Airdrop Triggers Community Backlash

Lean Harness, Fat Skill: The Real Source of 100x AI Productivity

Ultraman is not afraid of his mansion being attacked; he has a fortress.

US-Iran Negotiations Collapse, Bitcoin Faces Battle to Defend $70,000 Level

Reflections and Confusions of a Crypto VC

Morning News | Ether Machine terminates $1.6 billion SPAC deal; SpaceX holds approximately $603 million in Bitcoin; Michael Saylor releases Bitcoin Tracker information again

Crypto ETF Weekly | Last week, the net inflow for Bitcoin spot ETFs in the U.S. was $816 million; the net inflow for Ethereum spot ETFs in the U.S. was $187 million
After the blockade of the Strait of Hormuz, when will the war end?
Before using Musk's "Western WeChat" X Chat, you need to understand these three questions
The X Chat will be available for download on the App Store this Friday. The media has already covered the feature list, including self-destructing messages, screenshot prevention, 481-person group chats, Grok integration, and registration without a phone number, positioning it as the "Western WeChat." However, there are three questions that have hardly been addressed in any reports.
There is a sentence on X's official help page that is still hanging there: "If malicious insiders or X itself cause encrypted conversations to be exposed through legal processes, both the sender and receiver will be completely unaware."
No. The difference lies in where the keys are stored.
In Signal's end-to-end encryption, the keys never leave your device. X, the court, or any external party does not hold your keys. Signal's servers have nothing to decrypt your messages; even if they were subpoenaed, they could only provide registration timestamps and last connection times, as evidenced by past subpoena records.
X Chat uses the Juicebox protocol. This solution divides the key into three parts, each stored on three servers operated by X. When recovering the key with a PIN code, the system retrieves these three shards from X's servers and recombines them. No matter how complex the PIN code is, X is the actual custodian of the key, not the user.
This is the technical background of the "help page sentence": because the key is on X's servers, X has the ability to respond to legal processes without the user's knowledge. Signal does not have this capability, not because of policy, but because it simply does not have the key.
The following illustration compares the security mechanisms of Signal, WhatsApp, Telegram, and X Chat along six dimensions. X Chat is the only one of the four where the platform holds the key and the only one without Forward Secrecy.
The significance of Forward Secrecy is that even if a key is compromised at a certain point in time, historical messages cannot be decrypted because each message has a unique key. Signal's Double Ratchet protocol automatically updates the key after each message, a mechanism lacking in X Chat.
After analyzing the X Chat architecture in June 2025, Johns Hopkins University cryptology professor Matthew Green commented, "If we judge XChat as an end-to-end encryption scheme, this seems like a pretty game-over type of vulnerability." He later added, "I would not trust this any more than I trust current unencrypted DMs."
From a September 2025 TechCrunch report to being live in April 2026, this architecture saw no changes.
In a February 9, 2026 tweet, Musk pledged to undergo rigorous security tests of X Chat before its launch on X Chat and to open source all the code.
As of the April 17 launch date, no independent third-party audit has been completed, there is no official code repository on GitHub, the App Store's privacy label reveals X Chat collects five or more categories of data including location, contact info, and search history, directly contradicting the marketing claim of "No Ads, No Trackers."
Not continuous monitoring, but a clear access point.
For every message on X Chat, users can long-press and select "Ask Grok." When this button is clicked, the message is delivered to Grok in plaintext, transitioning from encrypted to unencrypted at this stage.
This design is not a vulnerability but a feature. However, X Chat's privacy policy does not state whether this plaintext data will be used for Grok's model training or if Grok will store this conversation content. By actively clicking "Ask Grok," users are voluntarily removing the encryption protection of that message.
There is also a structural issue: How quickly will this button shift from an "optional feature" to a "default habit"? The higher the quality of Grok's replies, the more frequently users will rely on it, leading to an increase in the proportion of messages flowing out of encryption protection. The actual encryption strength of X Chat, in the long run, depends not only on the design of the Juicebox protocol but also on the frequency of user clicks on "Ask Grok."
X Chat's initial release only supports iOS, with the Android version simply stating "coming soon" without a timeline.
In the global smartphone market, Android holds about 73%, while iOS holds about 27% (IDC/Statista, 2025). Of WhatsApp's 3.14 billion monthly active users, 73% are on Android (according to Demand Sage). In India, WhatsApp covers 854 million users, with over 95% Android penetration. In Brazil, there are 148 million users, with 81% on Android, and in Indonesia, there are 112 million users, with 87% on Android.
WhatsApp's dominance in the global communication market is built on Android. Signal, with a monthly active user base of around 85 million, also relies mainly on privacy-conscious users in Android-dominant countries.
X Chat circumvented this battlefield, with two possible interpretations. One is technical debt; X Chat is built with Rust, and achieving cross-platform support is not easy, so prioritizing iOS may be an engineering constraint. The other is a strategic choice; with iOS holding a market share of nearly 55% in the U.S., X's core user base being in the U.S., prioritizing iOS means focusing on their core user base rather than engaging in direct competition with Android-dominated emerging markets and WhatsApp.
These two interpretations are not mutually exclusive, leading to the same result: X Chat's debut saw it willingly forfeit 73% of the global smartphone user base.
This matter has been described by some: X Chat, along with X Money and Grok, forms a trifecta creating a closed-loop data system parallel to the existing infrastructure, similar in concept to the WeChat ecosystem. This assessment is not new, but with X Chat's launch, it's worth revisiting the schematic.
X Chat generates communication metadata, including information on who is talking to whom, for how long, and how frequently. This data flows into X's identity system. Part of the message content goes through the Ask Grok feature and enters Grok's processing chain. Financial transactions are handled by X Money: external public testing was completed in March, opening to the public in April, enabling fiat peer-to-peer transfers via Visa Direct. A senior Fireblocks executive confirmed plans for cryptocurrency payments to go live by the end of the year, holding money transmitter licenses in over 40 U.S. states currently.
Every WeChat feature operates within China's regulatory framework. Musk's system operates within Western regulatory frameworks, but he also serves as the head of the Department of Government Efficiency (DOGE). This is not a WeChat replica; it is a reenactment of the same logic under different political conditions.
The difference is that WeChat has never explicitly claimed to be "end-to-end encrypted" on its main interface, whereas X Chat does. "End-to-end encryption" in user perception means that no one, not even the platform, can see your messages. X Chat's architectural design does not meet this user expectation, but it uses this term.
X Chat consolidates the three data lines of "who this person is, who they are talking to, and where their money comes from and goes to" in one company's hands.
The help page sentence has never been just technical instructions.
