Any network traffic which goes through a gateway under your control can be controlled. DNSSEC[0] can make this more difficult, true, but not impossible as content ultimately originates from an IPv4/IPv6 address and can be dropped by upstream network devices.
0 - https://en.wikipedia.org/wiki/Domain_Name_System_Security_Ex...
Got a source for that? No phone or browser that I'm aware of uses "hardcoded DNS resolvers". They all use the OS DNS servers which the OS gets from DHCP.
By extension, any application or device could rely on DoH instead of OS-provided or network-provider DNS servers. It is controversial, since it both helps individuals combat ISP or government censorship and also helps bad actors do bad things [1].
[1]https://en.wikipedia.org/wiki/DNS_over_HTTPS#Analysis_of_DNS...
Most apps I've tried (and browsers too) can be blocked just fine via DNS. The gli.net interface allows "Override DNS Settings of All Clients" and "DNS Rebinding Attack Protection". This way, the router itself is the only resolver actually reachable. Even if I try some manual `dig google.com @1.1.1.1`, I still get the routers result.
The only thing it can't block is DNS over Https. I think that's by design, it seems it's impossible to block that.