@CrimsonChin if your comment was directed at me, I can but if you ask about something.
The following will have sections of education, so digest what you can and ask what you want.
Not long ago I wrote a blog about using encrypted authenticated DNS, primarily to dispel some long standing misinformation or irrelevant info, but also to show Steve Gibson the main features and advantages of using DNSCrypt compared to in-app solutions or the OS default.
DNSCrypt can be used with almost all OSs and routers that allow replacement software.
Many people opt to use it as their Pi-hole.
It can be used as a client or server solution, so home users and network admin have plenty of options.
One of the main advantages a lot of people may like, is the way it dynamically uses the resolvers from a large list https://dnscrypt.info/public-servers
The default mode is to automatically use whichever DNS is currently fastest for you from the filtered list you have.
This may be cloudflare, google or Quad9 or it may not. You don’t need to worry.
You can disable automatic mode and manually select your preferred resolvers, or even just 1.
For Windows users the “Simple DNSCrypt” distro is simple enough for all to use out of the box, as the defaults are suitable for most users.
To replace the DNS in the OS when run as a local client, it does not do anything fancy or disruptive.
It runs as a local proxy which will be accessed as a localhost DNS in the IP settings for each network connection.
For those not sure why we need something like this, and why it is so difficult
Currently DNS lookups are easily read, intercepted and changed for false results.
DNSSec helps with a few things such as validation, but few sites are configured to use it even though it is commonly available and cloudflare have made it standard.
To work properly you and the site you visit must both be using DNS that uses it.
Even then, no browsers have a way to detect or notify users that the connection is possibly subject to a man-in-the-middle attack.
Browser makers won’t add the feature, because site owners don’t enable it, because browsers don’t support it, because site owners… oh we seem to be in a stalemate where both want the other to make the first move.
Encrypted DNS has the obvious benefit of keeping the data secret, but only from the outside. The DNS host can see in.
This is why you also need authentication and validation to go with it.
You need to know that you are actually talking to the DNS you expect and trust.
As using certificates, authentication and validation is built into browsers it is easier to implement encrypted DNS there, hence we are seeing it there (Yandex browser was the first by adding DNSCrypt).
The DNS services in OSs can’t do this yet, but just as it is standard in browsers we can expect a very similar system in the OS, especially if based on the existing certificate system used by the OS and browsers.
DNSCrypt does not use certificates but does use public key crypto.
The keys are distributed with the daily updated resolver list.
Finally, as noted by others DoH is not the only option, but if Microsoft only add DoH support it may end up killing off the others which is not good.
DoT is a much better option for some users and the main rival, however you should have a look at the advantages and disadvantages all the encrypted systems have, in this handy comparison.
https://dnscrypt.info/faq