The whole point of ODoH is that the DNS provider doesn’t know who you are. So I don’t see how a customizable ad and tracker blocking DNS provider can support ODoH. For them to know what your blocking preferences are they need to know who you are.
Your only solution, which I think is what @Parish2555 is leading to, is to run your own ad and tracker blocking DNS server. For example a self hosted PiHole instance. And then have local DNS server that is under your control get its information from a ODoH server.
Can I know what u personally use? (just curious) + If I neglect DNS level anonymity and stick with encrypted DNS, which one I listed above would be the best trustworthy choice?
Rethink DNS + Firewall, the Android app, supports ODoH (code).
Goto Configure → DNS → Other DNS → ODoH.
On the server side, we run a by-invitation-only ODoH Proxy (not the ODoH resolver), for anti-censorship purposes. We open-sourced our ODoH proxy implementation, which is somewhat easily hostable by anyone and is super lightweight (code repo).
A wierd phenomenon happened with me which I considered as a vulnerability.
I was using Libretube and selected region which is not my country. One day, I suddenly started getting recommendations tailored to my country. I contacted the Dev of libretube, told him about it and shared the settings I was using.
He told me, “That must be your network then, LibreTube doesn’t do any fingerprinting of the client.”
I think of inviziblePro as A layer(like a cube, but empty inside) of my network(thinking network as a cube) that is capable hiding my networks IP and block unwanted domains through selected pathways.
If the layer is penetrated somehow, my network details would be exposed to both installed apps and websites.
Apps installed can get to know my IP(even if they are privacy friendly) when they pass data through that hole.
Thats just my analogy, I could be wrong. I would appreciate any sort of corrections here.