Does your user account have read access to the block device /dev/vgubuntu? If so, can you remove read access with a command like sudo chmod go-rwx /dev/vgubuntu? If that works, you should be able to create a udev rule that will automatically restrict the permissions on that device node. For example:
Edit: Oh, vgubuntu is a directory, not a node, so that udev rule probably won’t work. It might work if you change KERNEL=="vgubuntu" to KERNEL=="vgubuntu/*".
I don’t use LVM these days. I use ZFS instead, so I’m not sure. But I think you might be able to match something with a udev rule and remove access to it. Or, if it is a partition, you could set the partition to hidden.
It looks like those are symlinks, so you won’t be able to change the permissions there. You would need to adjust the permissions on the target of the symlink, but that would be more difficult to match with a udev rule (but perhaps not impossible).
Nautilus runs as your user account, so I think you should be able to block your user account from having read access to the device node (currently /dev/dm-6 but that might change across system boots). What does ls -al /dev/dm-6 show?
When I manually deactivated the logical volume (above command), the entry in nautilus vanished, so I just need to make sure that the logical volume does not gets active automatically on boot.
ay specifies autoactivation, which is used by system-generated activation commands. By default, LVs are autoactivated. An autoactivation property can
be set on a VG or LV to disable autoactivation, see --setautoactivation y|n in vgchange, lvchange, vgcreate, and lvcreate. Display the property with vgs or
lvs “-o autoactivation”. The lvm.conf(5) auto_activation_volume_list includes names of VGs or LVs that should be autoactivated, and anything not listed is not
autoactivated. When auto_activation_volume_list is undefined (the default), it has no effect. If auto_activation_volume_list is defined and empty, no LVs are
autoactivated. Items included by auto_activation_volume_list will not be autoactivated if the autoactivation property has been disabled.
Has the /etc/crypttab file also been updated in the initramfs? You can use lsinitrd | grep crypttab and check that the size of the file in the current initramfs image matches the size of the /etc/crypttab file on your root filesystem. If they don’t match, sudo dracut -f should work to update your current initramfs.