It was designed to withstand these types of attacks and the chances are extremely slim that you will accidentally land on a key that has some value to it.
This does not mean that it is impossible, i am just trying to say that you could try and swap the random key method with a more targeted approach.
In simple terms this means you analyze a system, and find it's weakest part, and start banging on that part for as long and as hard as you can in the hopes that it will give way.
By all means many private key's were not chosen randomly at all, many key's were calculated by using known algorithms, this leaves specific footprints, and some key types were even quenched further, by ruling out a rather large part of the possible solutions.
The designers assumed that it would be safer, but it actually makes things easier from a hackers perspective, by ruling out a large part of the key's you generate because they do not fit the lock type involved so they can be discarded before producing the heat and burning the way to the target key.
Of course this is not the case with a randomly chosen brute force attack, with or without jumps, like the thing in this thread, which could be anything, no footprint or target reduction involved, it will literally take forever.
When you carefully analyze the blockchain, you can discover clusters or 'vaults' which are very evidently present and they will show you that something is there and that it follows specific mechanisms, not random at all and if you are good in math, you can calculate the parameters of every one of these clusters and their strength so that you can point your computing power in more serious directions then just wasting it by shooting in the dark.