- Edited
So basically, if you add a "Private DNS" in Android, this will always use DNS-over-TLS as the protocol which is easily blocked by a network admin (e.g. in a public WiFi or at work or school). So if you use for example Adguard DNS to block ads, you'll often have to disable it in a public WiFi in order to connect to the Internet and then remember to enable it again afterwards. Those of you who use the Private DNS feature with a privacy-respecting or ad-blocking provider like Adguard, NextDNS, ControlD, Mullvad, Quad9 and so on, you'll definitely have seen a notification like "Private DNS cannot be accessed" when connecting to a public WiFi.
However, Android does have the ability to connect via DNS-over-HTTPS (not easily blockable) but they have hardcoded Cloudflare and Google as the only permitted resolvers to use DNS-over-HTTPS. [inaccurate claims about this from a privacy content creator have been removed]
I am wondering if GrapheneOS would consider expanding DNS-over-HTTPS support for all DNS providers? Or add a toggle whether the user wants to use DoH or DoT? It seems that the code is already there and they have simply hardcoded the allowed servers for DoH, so to me (a non-programmer) it seems like a relatively small change to make.