Requesting to add this recommendation since there’s no advantage to use DoH when connected to a VPN. DoH is there by default because Mullvad can’t assume Mullvad Browser users are using a VPN and DNS requests are encrypted. When using a VPN, DOH/DOT (or any other form of encrypted DNS) with third-party servers will simply add more entities to trust and does absolutely nothing to improve your privacy/security. Also turning off DoH when using a VPN does not reduce the fingerprinting protections Mullvad Browser provides.
Doesn’t Mullvad Browser use it’s own DoH though? Because they offer that to pretty much anyone for free. You should still obviously shut it off if you’re using a VPN (especially if you’re using a 3rd party VPN and, for whatever reason, enjoy Mullvad Browser but don’t trust their VPN service.) but I don’t think you have to worry about trusting another party if you’re already using Mullvad VPN. Unlike stock Firefox, which I think uses Cloudfare DoH.