Diamonds Are for Hackers
This talk demonstrates the construction of an open-source, low-cost quantum magnetometer using nitrogen-vacancy (NV) center diamonds. It details the hardware and firmware design, including the use of off-the-shelf components like the ESP32 microcontroller and ADF4351 signal generator to replace expensive laboratory equipment. The presenters show how to achieve magnetocardiography (MCG) measurements by filtering signals with simple red filter gels and custom transimpedance amplifiers. The project aims to democratize access to quantum sensing technology for the hacker community.
How to Build a $160 Quantum Magnetometer with Off-the-Shelf Parts
TLDR: Researchers at DEF CON 2025 demonstrated that high-precision quantum sensing is no longer restricted to multi-thousand-dollar laboratory equipment. By leveraging nitrogen-vacancy (NV) center diamonds, an ESP32, and an ADF4351 signal generator, they built a functional magnetometer capable of magnetocardiography. This research proves that complex physics can be reduced to software problems, opening the door for hobbyists and security researchers to experiment with quantum hardware on a budget.
Quantum technology is often presented as an impenetrable wall of cryogenics, million-dollar budgets, and PhD-level physics. Most of us in the security community treat it as a distant threat to RSA or a buzzword for future-proofing. However, the recent work presented at DEF CON 2025 by the team behind the Quantum Village shatters that perception. They have successfully moved quantum sensing out of the lab and onto a breadboard, proving that you do not need a shielded room to perform sensitive magnetic measurements.
The Physics of the NV Center Diamond
At the heart of this research is the nitrogen-vacancy (NV) center in diamond. When a nitrogen atom replaces a carbon atom in the diamond lattice and an adjacent carbon atom is missing, it creates a defect. This defect acts as a quantum system that responds to magnetic fields. Crucially, unlike many other quantum systems that require near-absolute zero temperatures to function, NV centers operate at room temperature.
The team used the diamond's energy levels to detect magnetic flux. By irradiating the diamond with green light (520-525nm), they excite the NV centers. As the centers relax, they emit red light. The intensity of this red light is modulated by the magnetic environment surrounding the diamond. By applying microwave frequencies—specifically around 2.87 GHz—they can manipulate the spin states of these centers. When a magnetic field is present, the energy levels split, a phenomenon known as the Zeeman effect. By measuring the red light output while sweeping microwave frequencies, they can map these shifts to determine the strength of the magnetic field.
Reducing Physics to a Software Problem
The genius of this build lies in its rejection of specialized, expensive laboratory hardware. Instead of using a high-end signal generator, the team utilized the ADF4351 frequency synthesizer, a common component in RF hacking. By controlling the ADF4351 via SPI from an ESP32, they created a programmable microwave source.
The detection side is equally clever. They used a standard BPW34 photodiode to capture the red light emitted by the diamond. Because the signal from the photodiode is extremely weak, they designed a custom transimpedance amplifier to boost it before feeding it into the ESP32’s analog-to-digital converter (ADC).
The firmware, written in the Arduino IDE, handles the signal processing. Rather than performing complex real-time calculations on the microcontroller, the team pre-computed the frequency sweep arrays. This allows the ESP32 to simply cycle through the pre-defined values, read the photodiode output, and stream the data over UART. This approach turns a complex quantum measurement into a straightforward data acquisition task.
Real-World Pentesters and the "Uncut Gem"
For a security researcher, the immediate question is: what can you do with a portable, low-cost magnetometer? The team demonstrated magnetocardiography (MCG), which is the measurement of the magnetic fields generated by the electrical activity of the heart. If you can measure the magnetic field of a heart, you can measure the magnetic field of other electronic components.
In a physical security engagement, this could theoretically be used to perform side-channel analysis on hardware devices. Many microcontrollers and cryptographic chips leak information through electromagnetic emissions. While a $160 sensor is not going to replace a high-end oscilloscope or a specialized EM probe, it provides a starting point for exploring side-channel vulnerabilities in an accessible, portable form factor.
The "Uncut Gem" project is fully open-source, and the team has released the PCB designs and firmware for anyone to replicate. The current iteration uses a simple epoxy prism to hold the diamond, photodiode, and microwave antenna in alignment. It is a "hackable" design that invites modification. If you have ever wanted to get hands-on with quantum hardware without needing a government grant, this is your entry point.
A Note on Defenses
From a defensive perspective, this research highlights the increasing accessibility of hardware-based side-channel attacks. As these sensors become cheaper and more sensitive, the physical security of devices—especially those handling sensitive keys or performing cryptographic operations—becomes more critical. If your hardware is vulnerable to EM side-channel analysis, the barrier to entry for an attacker is dropping rapidly. Implementing robust shielding and power analysis countermeasures is no longer just for high-assurance military hardware; it is becoming a necessary consideration for any device that could be physically accessed by an adversary.
The path forward for this project is clear: the team is looking for contributors to improve the RF antenna design, refine the transimpedance amplifier, and develop better encapsulation methods for the diamond. If you have a background in RF engineering or embedded firmware, this is a prime opportunity to contribute to the democratization of quantum sensing. Grab the files, order the parts, and start measuring.
Tools Used
Target Technologies
Up Next From This Conference

DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks

Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen

Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

