Couple of things... IPv6 does have the concept of non-routable prefixes, similar to RFC1918 addresses that IPv4 has. These are defined in RFC5156. There are several... The scope of fe80::/10 is designated for "link-local" addressing. These define local addresses a shared ethernet segment. These are automatically generated and assigned. These are still used for things like routing protocols and next-hops.
Original specifications also called for "site-local" addressing in the scope of fec0::/10. Site-local addresses are perfectly analogous to RFC1918 addresses. These have, however, been depricated and are not recommended for use in modern networks.
Why? Because NAT has been depricated with IPv6. NAT is an ugly hack that breaks a lot of protocols and is generally not a great idea. It also does not, by itself, provide any sort of security what so ever. An open PAT on a router (which has to happen for an inside host to talk to an outside host) is bidirectional and stateless. There are no protections offered what so ever. It is only when you begin to add firewalling that protections start to be seen. Stateful packet inspection, for instance, will make sure that only packets of the same L4-7 protocol as the protocol that originated the PAT pass through the open PAT.
Firewalling, however, can also be done without NAT, and is equally effective. Routed firewalling can be done without NAT and firewalling can also be completely transparent. It is equally as effective as firewalling with NAT, but is safe in terms of L7 protocols which rely on L3 addressing (SIP, HTTP, FTP, PPTP, and RPC, to name a few.) NAT breaks a lot of things and the only thing it does for IPv4 is provide for reusable IP space.
IPv6, on the other hand, has no shortage of addresses. And, in fact, there exist enough addresses for every person on Earth both now and to be born in the next hundred years to have the equivilent of the current IPv4 address space for every minute of their lives. The smallest available block requestable from ARIN by an enterprise is a /64, which is nearly incomprehensibly larger than the existing IPv4 address space. So much so that they've decided that they're only going to assign global unicast IP addresses from the 2000::/3 scope.
Basically, there is no need for NAT anymore, and thus no need for a "private" IP scope. This is a GOOD thing, not a bad thing. NAT is not security and should not be considered as such. A good firewall does not require NAT to be effective. It is very possible to shield your internal network from external view without NAT.