I recognize you are trying to be helpful.
Long post ahead not intended to rant but in the interest of technical facts to drive the resolution :
the cookies we are talking about can be read and possibly persistently set even in private browsing mode because the vector for these 'supercookies' is the HSTS support in the browser on the device. Even in private browsing mode it is trivial to fingerprint the browser and store that unique id. Private browsing only is intended to clear history etc when you're done with your session and what I'm saying is these supercookies aren't reliably removed then either.
The problem is both malicious developers and non malicious developers can use this pathway and currently there is no way to control it even with extensions like content blockers. This results in a great reduction in internet privacy even if you use a VPN, dnscrypt, and so on because they have a fingerprint of your specific browser and can track you wherever.
The cookies also cannot be deleted on iOS safari because the user cannot delete "caches" i.e. a type of local storage object used like a cookie. Therefore when you choose to delete cookies these caches are not deleted.
To get a resolution we are saying allow the caches to be deleted on iOS without completely resetting your phone on every new supercookie infection.