Let the Philistines flounce. What's left might befit a tech website after all.
Yes. Every time I close the browser. Every time I close a tab, for all cookies set within that tab. Every time a cookie hasn't been used for 1 minute.
I could probably set an exception for OcUK...but is it OcUK? Just this page alone runs scripts from 11 different places. My security and privacy settings are blocking 9 of those 11. I've no doubt that if I allowed them to run they would in turn run more scripts from more places and I've no doubt that some of them would be some form of spyware (even if it's "just" tracking every webpage I visit and keeping a log to sell to advertisers).
Reading between the lines I think we have similar threat models/opsec. What browser are you using though? Firefox has
full cookie compartmentalisation nowadays. Just enable Enhanced Tracking Protection > Strict in settings, and then even without clearing cookies or whatever nobody from domain A can track you across domain B or vice versa. Now $(tracking company) and everyone else gets a new 'jailed' cookie for every domain you visit. They're kept in separate per-domain 'jars'. If, say, Facebook is trying to place a cookie on OcUK and a cookie on YouTube (why aren't you using Invidious?
), it'll have one cookie in the OcUK jar (only readable on OcuK) and another cookie in the YouTube jar, etc.
Tracking you (using cookies) is now impossible, versus the usual method of allowing Amazon/DoubleClick/Facebook or whomever to access a single cookie from every domain you visit, giving them full birds-eye view of your browsing. Further disable all third party cookies if you must. This out of the box setup negates the need for effectively having private browsing enabled 24/7.
If you add in CookieAutoDelete extension on top, you can still set it to delete all cookies every time you change domain, except the few you have added to the whitelist. That way, everything's gone bar the things you want to keep (OcUK, forums, Github/Gitlab, your nugget porn, whatever) and you're solid. Don't forget uBO in 'hard mode' (or use NoScript), but it sounds like you have that covered. If you're really strict, use arkenfox user.js to harden the browser, add in javascript restrictor and etag stoppa (or Trace or ClearUrls at your fancy) and enjoy...
Now there's no excuse not to enable MFA without moaning, you great banana.