In today's dynamic technological landscape, securing realistic user data has become crucial for analysts. This type of data supports valid simulations, evaluation of applications, and understanding valuable insights into user patterns. Traditional methods of data collection can be time-consuming, often failing the necessary scale and authenticity.