In today's dynamic technological landscape, securing realistic user data has become crucial for researchers. This type of data supports accurate simulations, evaluation of applications, and understanding valuable insights into user patterns. Traditional methods of data acquisition can be resource-intensive, often failing the necessary scale and aut