Just leaving this here. Heads up!
Firefox' DNS over HTTPS feature is potentially really great.
One problem: this evidently bypasses the local hosts file. So if this is enabled, you get the full advertising/tracking browsing experience.
Anybody have any ideas?

@StevenBlack Add the following into your network configuration ? https://support.mozilla.org/en-US/kb/canary-domain-use-application-dnsnet
Thanks Nissar @funilrys. I'd like to nominate this mozilla support page for a prize, as the worst. Just awful.
Just putting this as a concern that needs to be still looked at, if the user manually enables DOH in Firefox, it bypasses everything (hosts file, recursive resolver configured in the OS) i.e the canary domain workaround doesn't work.
Yes Swapneel @swapneelp I agree. I don't understand why this feature works this way.
I understand the browser encrypts the DNS request. That has to happen somewhere, in a way that doesn't "leak" anything about the request.
Maybe this is the only way this could work. It just seems like, there must be a better way.
@StevenBlack DoH hijacks control of DNS away from network operators (like me) who use the DNS to block malicious content and protect small networks. A much saner option was DoT(rfc7858). DoH now raises the costs for everyone using DNS as a layer of defense. To summarise, the fantastic blocking lists that you folks curate and maintain will now need a solution at the OS packet layer to glue and make blocking work.
The best way to prevent users from enabling this option is described here: https://github.com/mozilla/policy-templates#dnsoverhttps
The best way to prevent users from enabling this option is described here: https://github.com/mozilla/policy-templates#dnsoverhttps
Agree.
Also except locking, disabling and ... they added ability to exclude domains from being resolved using DoH in FF75.
@StevenBlack isn't this the same as #968 which has more info and is older? 🙂
@XhmikosR same basic issue, yes. Chrome (#968) and Firefox here.
Why not just use uMatrix or uBlock origin? You can even host local files if you have something like xampp. Or for system wide use best is Acrylic DNS. Maybe YogaDNS too. I use uMatrix as hosts blocker and media type (scripts, images, videos, css) blocker in Chrome and Firefox. You can quickly include or exclude any blocked host or media type, without restarting anything.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 14 days if no further activity occurs. Thank you for your contributions.
Closing.
Most helpful comment
@StevenBlack DoH hijacks control of DNS away from network operators (like me) who use the DNS to block malicious content and protect small networks. A much saner option was DoT(rfc7858). DoH now raises the costs for everyone using DNS as a layer of defense. To summarise, the fantastic blocking lists that you folks curate and maintain will now need a solution at the OS packet layer to glue and make blocking work.