Mozilla Company
Mozilla considers DNS-over-HTTPS (DoH) as a tool to ensure user privacy and security, which eliminates the leakage of information about the requested host names through the DNS servers of providers, allows you to fight MITM attacks and DNS traffic spoofing, resists blocking at the DNS level and will allow it to work if it is impossible to directly access DNS servers (for example, when working through a proxy). If in a normal situation DNS requests are directly sent to the DNS servers defined in the system configuration, then in the case of DoH, the request to determine the host IP address is encapsulated in HTTPS traffic and sent in encrypted form to one of the centralized DoH servers, bypassing the DNS servers provider.
From the perspective of UK ISPA, the DNS-over-HTTPS protocol, on the contrary, threatens the security of users and destroys the standards adopted in the UK for Internet security, as it makes it easier to bypass blocking and filters installed by providers in accordance with the requirements of UK regulators or when organizing parental control systems. In many cases, such blocking is done through DNS query filtering, and the use of DNS-over-HTTP negates the effectiveness of these systems.
Source: opennet.ru