I think the gist of the discussion was that whitelisting use-application-dns.net should preclude any list provider from erroneously adding the domain. My quick tests shows that works:
dan@raspberrypi:~ $ pihole -q -exact use-application-dns.net
[i] No exact results found for use-application-dns.net within the block lists
dan@raspberrypi:~ $ dig use-application-dns.net @127.0.0.1
; <<>> DiG 9.11.5-P4-5.1+deb10u3-Raspbian <<>> use-application-dns.net @127.0.0.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
dan@raspberrypi:~ $ pihole -w use-application-dns.net
[i] Adding use-application-dns.net to the whitelist...
[✓] Reloading DNS lists
dan@raspberrypi:~ $ dig use-application-dns.net @127.0.0.1
; <<>> DiG 9.11.5-P4-5.1+deb10u3-Raspbian <<>> use-application-dns.net @127.0.0.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
dan@raspberrypi:~ $ pihole -q -exact use-application-dns.net
Exact match found in exact whitelist
use-application-dns.net
@jpgpi250 Can you confirm this behavior or find a situation that this would not work?