I didn't mean to suggest that your SQRL password could be stolen via phishing, rather that a bad actor could fake an SQRL login and then fake some kind of privileged action. And that the "simple" and "quick" nature of SQRL gives the user less pause to evaluate if the site they're logging in to is real. But in retrospect, the phish overall would not be "trivial."
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
I don't think that SQRL is prone to phishing. It generates a private key based on the URL. Look at these slides, specifically page 7.
What would probably happen is the SQRL would say you haven't signed up on that site.
I didn't mean to suggest that your SQRL password could be stolen via phishing, rather that a bad actor could fake an SQRL login and then fake some kind of privileged action. And that the "simple" and "quick" nature of SQRL gives the user less pause to evaluate if the site they're logging in to is real. But in retrospect, the phish overall would not be "trivial."