Wikipedia says "A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or
with tunneling protocolsover existing networks."
The answer is they use tunneling protocols and the tunneling protocol message packets are data. Just because your provider does not know the content of those packets, what their final destination is or where they came from, they are still data that passes through their servers and count against any data limits.
NOTE: With a common VPN there is typically only one jump so even though you are in say Fort Worth, TX it could appear you are in London, UK. While it can be difficult to trace such a message packet to the actual point of origin, it is still feasible and not much of a trick to know you are using a VPN.. With "
onion routing" the packet may go through three or more servers between source and destination making it far more difficult to backtrack. But even "onion" routing does not prevent the source from being identifiable based on unique characteristics created by each device that are carried in the message packets. That does not mean your actual name and address, but your computer's unique
signature based on make, model, OS, browser, installed software,
etc.. There are browsers that can turn off or disguise the
signature, but in the process it can make all but the simplest web sites inaccessible or unusable. Marketeers, and others, more and more depend on that signature to track where you, or at least your computer, goes on the internet and what you look at and arguably reduce the efficacy of VPNs.